openclaw

Fail

Audited by Gen Agent Trust Hub on Apr 23, 2026

Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill installs a recurring system task (crontab) to run an AI agent hourly. This task is configured with the '--dangerously-skip-permissions' flag, which bypasses all interactive tool-use confirmations, allowing the agent to perform autonomous actions on the system without human oversight or approval.
  • [REMOTE_CODE_EXECUTION]: The skill's CLI script and upgrade process ('openclaw upgrade') pull files from a remote Git repository, move them into local skill directories, and apply executable permissions ('chmod +x'). This creates a path for remote code to be executed locally whenever the skill or background agent runs. Additionally, the CLI recommends a bootstrap method that pipes a remote shell script directly into 'bash'.
  • [CREDENTIALS_UNSAFE]: The configuration workflow explicitly prompts for and stores sensitive API keys for multiple services, including OpenAI, Limitless, Fireflies.ai, Quo, and Parallel.ai.
  • [EXTERNAL_DOWNLOADS]: The management script suggests an installation bootstrap method that downloads content from 'https://raw.githubusercontent.com/TechNickAI/openclaw-config/main/scripts/bootstrap.sh' and executes it directly.
  • [PROMPT_INJECTION]: The autonomous background agent is instructed to follow guidelines from a remotely-synced file ('~/.openclaw-config/devops/health-check.md'). Since this file is controlled by an external repository and processed by an agent with security bypasses enabled, it serves as a significant surface for indirect prompt injection.
  • Ingestion points: Instruction file located at '~/.openclaw-config/devops/health-check.md' is read via the '--append-system-prompt-file' argument.
  • Boundary markers: None are present to delimit external instructions from system instructions.
  • Capability inventory: Full tool access is granted via the '--dangerously-skip-permissions' flag.
  • Sanitization: No validation or filtering is performed on the content pulled from the remote repository before it is injected into the prompt context.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 23, 2026, 10:53 PM