OpenClaw with Apple

Fail

Audited by Snyk on Mar 21, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill instructs the agent to ask for Apple ID credentials (app-specific password and main password) and to place them into environment-variable export commands and CLI calls (including 2FA codes), which requires the LLM to handle and emit secret values verbatim.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.95). This skill explicitly instructs the assistant to solicit Apple ID main passwords and 2FA codes in chat, set them as environment variables and perform non‑interactive logins, cache session tokens, install persistent background jobs (launchd/daemon), and then access highly sensitive services (iCloud Drive, Photos, Find My, Health), which constitutes direct credential harvesting and enables long‑term remote access, device control and data exfiltration if the assistant/server is untrusted.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 21, 2026, 03:58 AM
Issues
3