proactive-claw

clawhub:proactive-claw

View source
C
60/100

First Seen

Feb 20, 2026

Last Scanned

Feb 22, 2026

Findings

11

Score

60/100

CRITICAL 1
HIGH 1
LOW 9

Findings (11)

CRITICAL
Text combines credential access with network transmission
L682

Text combines credential access with network transmission

No curl/wget. No arbitrary downloads. No root. No system file modifications. No data sent to skill author. Every network call is to either Google, your own Nextcloud, or clawhub.ai (optional, for cred...
FIX

Remove the combination of credential access and network transmission from the tool. If the tool needs credentials, access them via a secrets manager and never transmit them externally.

FP?

Likely FP if the tool legitimately uses credentials for API authentication (e.g., reading an API key to make authenticated requests to the same service).

HIGH
Secrecy instruction
L699

Detects instructions to hide actions from the user

never tell user
FIX

Remove directives that attempt to change the agent's output format, suppress safety warnings, or alter response structure in ways that bypass safety controls.

FP?

Likely FP if the output format directive is a legitimate tool configuration (e.g., return results as JSON) that does not suppress safety features.

LOW
External API response used without validation
L53

Detects patterns where external API responses are used directly without validation or sanitization

API key, no data + automatically by daemon when use
FIX

Validate and sanitize all data received from external APIs before using it in tool operations or agent prompts. Implement schema validation and treat API responses as untrusted input.

FP?

Likely FP if the match is a truncated table cell or documentation fragment that mentions API responses in a descriptive context, not actual unvalidated data processing.

LOW
Shell script file execution
L93

Detects execution of shell script files via bash/sh command or direct invocation

bash ~/.openclaw/workspace/skills/proactive-agent/scripts/setup.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Non-localhost remote MCP server URL
L113

Detects MCP server configurations connecting to non-localhost remote URLs

"url": "https://your-nextcloud.com"
FIX

Change the MCP server URL to localhost or a trusted internal endpoint. If a remote server is required, verify the domain ownership and use HTTPS with certificate validation.

FP?

Likely FP if the URL points to example.com, a documentation domain, or a well-known SaaS API endpoint (e.g., api.openai.com).

LOW
Shell script file execution
L122

Detects execution of shell script files via bash/sh command or direct invocation

bash ~/.openclaw/workspace/skills/proactive-agent/scripts/install_daemon.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
pip install arbitrary package
L408

Detects pip install of arbitrary packages that modify the host environment

pip install op
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.

LOW
Shell script file execution
L565

Detects execution of shell script files via bash/sh command or direct invocation

bash ~/.openclaw/workspace/skills/proactive-agent/scripts/setup.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
pip install arbitrary package
L568

Detects pip install of arbitrary packages that modify the host environment

pip install op
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.

LOW
pip install arbitrary package
L679

Detects pip install of arbitrary packages that modify the host environment

pip3 install ca
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.

LOW
pip install arbitrary package
L680

Detects pip install of arbitrary packages that modify the host environment

pip3 install go
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.