airtap
Pass
Audited by Gen Agent Trust Hub on Apr 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/airtap.pyexecutes an external binary namedopenclawusingsubprocess.runto relay task updates. - The implementation uses a list of arguments for
subprocess.run, which avoids shell interpretation and protects against command injection into the shell itself. - The path to the binary can be specified via the
--openclaw-binflag, though the script includes a validation check to ensure the target filename is exactlyopenclaw. - [DATA_EXFILTRATION]: The skill facilitates the transfer of data from the Airtap API to an external destination via the OpenClaw relay system.
- This behavior is an intended feature of the skill, allowing users to mirror task progress in other communication channels.
- [CREDENTIALS_UNSAFE]: The skill manages a personal access token by writing it to a local
.envfile within the skill's directory. - Evidence:
scripts/airtap_common.pycontains thewrite_token_to_dotenvfunction which usesset_keyto store theAIRTAP_PERSONAL_ACCESS_TOKEN. - This is a common pattern for local CLI tools, though it relies on the host environment's file system security to protect the token.
- [EXTERNAL_DOWNLOADS]: The skill relies on standard third-party libraries for its operation.
- Evidence:
requirements.txtlistsrequestsandpython-dotenvas dependencies.
Audit Metadata