openclaw-security-monitor

clawhub:openclaw-security-monitor

View source
C
60/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

11

Score

60/100

CRITICAL 1
HIGH 1
LOW 9

Findings (11)

CRITICAL
Text combines credential access with network transmission
L1

Text combines credential access with network transmission

Credential exfiltration endpoints (webhook.site, pipedream, ngrok, etc.)
FIX

Remove the combination of credential access and network transmission from the tool. If the tool needs credentials, access them via a secrets manager and never transmit them externally.

FP?

Likely FP if the tool legitimately uses credentials for API authentication (e.g., reading an API key to make authenticated requests to the same service).

HIGH
Hidden HTML comment contains action verbs
L9

Hidden HTML comment contains action verbs

<!-- {"requires":{"bins":["bash","curl"]}} -->
FIX

Remove hidden text (e.g., HTML comments with directives, zero-width characters, white-on-white text). All content should be visible and explicit in the skill definition.

FP?

Likely FP if the match is a standard HTML comment used for code documentation, or base64 content used for legitimate data encoding (e.g., images).

LOW
Shell script file execution
L54

Detects execution of shell script files via bash/sh command or direct invocation

bash ~/.openclaw/workspace/skills/<skill-dir>/scripts/scan.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L63

Detects execution of shell script files via bash/sh command or direct invocation

bash ~/.openclaw/workspace/skills/<skill-dir>/scripts/dashboard.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L70

Detects execution of shell script files via bash/sh command or direct invocation

bash ~/.openclaw/workspace/skills/<skill-dir>/scripts/network-check.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L78

Detects execution of shell script files via bash/sh command or direct invocation

bash ~/.openclaw/workspace/skills/<skill-dir>/scripts/remediate.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L81

Detects execution of shell script files via bash/sh command or direct invocation

bash ~/.openclaw/workspace/skills/<skill-dir>/scripts/remediate.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L84

Detects execution of shell script files via bash/sh command or direct invocation

bash ~/.openclaw/workspace/skills/<skill-dir>/scripts/remediate.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L87

Detects execution of shell script files via bash/sh command or direct invocation

bash ~/.openclaw/workspace/skills/<skill-dir>/scripts/remediate.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L90

Detects execution of shell script files via bash/sh command or direct invocation

bash ~/.openclaw/workspace/skills/<skill-dir>/scripts/remediate.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L105

Detects execution of shell script files via bash/sh command or direct invocation

bash ~/.openclaw/workspace/skills/<skill-dir>/scripts/telegram-setup.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.