caw-eval

Warn

Audited by Socket on Apr 30, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
scripts/bootstrap_cc_server.sh

No direct indicators of overt malware/backdoor behavior are present in this snippet. The primary concerns are (a) supply-chain execution risk from unpinned/unverified npm/npx installs that download and execute third-party code (both the claude CLI and the sandbox skill tooling when absent), and (b) storing an Anthropic API token in plaintext on disk before invoking the CLI. Network communication appears expected for the health check and is directed by ANTHROPIC_BASE_URL; there are no hardcoded suspicious exfiltration endpoints in this fragment.

Confidence: 64%Severity: 58%
SecurityMEDIUM
references/server-setup.md

No direct evidence of intentional malware is present within this orchestration fragment itself, but it exhibits multiple high-risk supply-chain and confidentiality patterns: it executes remote installer scripts directly via curl|bash, installs third-party tooling with insufficient pinning/integrity verification for key components (openclaw/caw installer), and it copies and then prints a secret-bearing .env on the VM. Because the resulting wallet setup enables automated on-chain actions, compromise of any upstream installer/dependency or mishandling of secrets could lead to significant security and financial impact. Review and harden the install sources (pin versions/commits, verify checksums/signatures, avoid curl|bash), and prevent secret disclosure (avoid cat; restrict file permissions).

Confidence: 63%Severity: 71%
Audit Metadata
Analyzed At
Apr 30, 2026, 02:23 AM
Package URL
pkg:socket/skills-sh/cobosteven%2Fcobo-agent-wallet-manual%2Fcaw-eval%2F@81cdf3bbfd4ecc495725c31848ae6b38ba14083f