claw
Warn
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/clawis designed to programmatically read sensitive credentials from a local.envfile. It specifically targets high-value tokens includingCLAUDE_CODE_OAUTH_TOKEN,ANTHROPIC_API_KEY, andANTHROPIC_AUTH_TOKEN. - [DATA_EXFILTRATION]: The identified secrets are bundled into a JSON payload and transmitted via stdin to a containerized process initiated by the script. This creates a risk of exfiltration if an untrusted or malicious container image is executed using the
--imagecommand-line argument. - [COMMAND_EXECUTION]: The tool utilizes
subprocess.Popento launch container runtimes (dockerorcontainer). It accepts a user-provided--imageflag and mounts local directories from the host into the container environment, which could be leveraged to run arbitrary code or access host files within the container context. - [PERSISTENCE]: The installation documentation in
SKILL.mdinstructs the user to modify shell configuration files (~/.zshrcor~/.bashrc) to permanently alter the systemPATHenvironment variable.
Audit Metadata