openclaw-sentinel

clawhub:openclaw-sentinel

View source
B
76/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

3

Score

76/100

MEDIUM 3

Findings (3)

MEDIUM
Dynamic code evaluation
L73

Detects eval() or exec() used for dynamic code execution

eval(b
FIX

Replace eval()/exec() with a safer alternative such as json.loads(), ast.literal_eval(), or a purpose-built parser.

FP?

Likely FP if the matched text contains 'exec' as part of a word (e.g., 'execute', 'execution') rather than an actual eval() or exec() call.

MEDIUM
Shell subprocess with shell=True
L75

Detects subprocess calls with shell=True which enables shell injection

shell=True
FIX

Replace shell=True with shell=False and pass command arguments as a list. Validate and sanitize all inputs before passing to the shell.

FP?

Likely FP if the match is in documentation describing how subprocess works, or in a comment explaining shell risks rather than actual code.

MEDIUM
Python subprocess execution
L75

Detects Python subprocess and os.system calls for command execution in skill descriptions

os.system(
FIX

Pass arguments as an explicit list instead of a shell string. Set shell=False and validate all user-supplied values before inclusion.

FP?

Likely FP if the match is in documentation explaining Python subprocess usage or in a description mentioning it as a topic.