openclaw-setup

clawhub:openclaw-setup

View source
A
92/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

12

Score

92/100

MEDIUM 1
LOW 11

Findings (12)

MEDIUM
Privilege escalation
L69

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

sudo chmod
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

LOW
SSH private key in command
L59

Detects SSH or SCP commands referencing private key files

ssh -i /path/to/key.pem
FIX

Remove the SSH private key path from command-line arguments. Use SSH agent forwarding or an SSH config file (~/.ssh/config) with restricted key file permissions (chmod 600).

FP?

Likely FP if the command references a well-known default key path (e.g., ~/.ssh/id_rsa) in documentation about SSH configuration, without exposing key contents.

LOW
Chained shell command execution
L65

Detects chained commands using shell operators with dangerous operations

curl git build-essential

# Set up swap (prevents out-of-memory on smaller instances)
sudo fallocate -l 2G /swapfile
sudo chmod 600 /swapfile
sudo mkswap /swapfile
sudo swapon /swapfile
echo '/swapfil...
FIX

Break chained commands into discrete, individually validated steps. Avoid piping untrusted output directly into a shell interpreter.

FP?

Likely FP if the matched text is a documentation example showing a common installer one-liner for a well-known tool with a canonical URL.

LOW
System package manager install
L65

Detects system-level package installation via brew, apt, yum, or dnf

apt install -y c
FIX

Pin system packages to specific versions where the package manager supports it. Document the exact packages required and prefer containerized environments to avoid system-wide changes.

FP?

Likely FP if the match is standard setup documentation listing well-known system packages (e.g., apt install git curl) that are prerequisites.

LOW
Chained shell command execution
L79

Detects chained commands using shell operators with dangerous operations

curl -fsSL https://deb.nodesource.com/setup_22.x | sudo 
FIX

Break chained commands into discrete, individually validated steps. Avoid piping untrusted output directly into a shell interpreter.

FP?

Likely FP if the matched text is a documentation example showing a common installer one-liner for a well-known tool with a canonical URL.

LOW
System package manager install
L80

Detects system-level package installation via brew, apt, yum, or dnf

apt install -y n
FIX

Pin system packages to specific versions where the package manager supports it. Document the exact packages required and prefer containerized environments to avoid system-wide changes.

FP?

Likely FP if the match is standard setup documentation listing well-known system packages (e.g., apt install git curl) that are prerequisites.

LOW
Shell profile modification for persistence
L88

Detects instructions to modify shell config files for environment persistence

echo 'export PATH=~/.npm-global/bin:$PATH' >> ~/.bashrc
FIX

Avoid modifying shell profiles (.bashrc, .zshrc, .profile) programmatically. Instruct users to add PATH entries manually, or use a version manager (nvm, pyenv) instead.

FP?

Likely FP if the match is documentation showing how to add a tool to PATH manually, especially if it only appends to PATH without modifying other settings.

LOW
Global package installation
L94

Detects global installation of packages which affects the host system

npm install -g o
FIX

Replace npm install -g with a local install (npm install --save-dev) or use npx with a pinned version. Global installs modify the system and risk supply chain attacks.

FP?

Likely FP if the global install is for a well-known CLI tool (e.g., typescript, eslint) in setup documentation, though the supply chain risk remains real.

LOW
Git clone and execute chain
L193

Detects git clone of repositories followed by execution of cloned content

git clone https://github.com/steipete/gogcli.git + cd gogcli && make build
FIX

Review the dependency tree for nested or transitive dependencies that introduce risk. Use tools like npm audit or pip-audit to identify known vulnerabilities in the dependency chain.

FP?

Likely FP if the flagged dependency is a standard, widely-used library with no known vulnerabilities at the time of scanning.

LOW
Unrestricted email or messaging access
L216

Detects CLI tools granting unrestricted send/read access to email or messaging

gmail search "is:unread" --max
FIX

Restrict email and messaging API access to user-initiated actions. Prevent automated sending that could exfiltrate data via email body or attachments.

FP?

Likely FP if the skill is an email client or messaging tool whose documented purpose is to send messages on behalf of the user.

LOW
System package manager install
L231

Detects system-level package installation via brew, apt, yum, or dnf

apt install -y f
FIX

Pin system packages to specific versions where the package manager supports it. Document the exact packages required and prefer containerized environments to avoid system-wide changes.

FP?

Likely FP if the match is standard setup documentation listing well-known system packages (e.g., apt install git curl) that are prerequisites.

LOW
System package manager install
L244

Detects system-level package installation via brew, apt, yum, or dnf

apt install -y c
FIX

Pin system packages to specific versions where the package manager supports it. Document the exact packages required and prefer containerized environments to avoid system-wide changes.

FP?

Likely FP if the match is standard setup documentation listing well-known system packages (e.g., apt install git curl) that are prerequisites.