openclaw-secure-linux-cloud

Warn

Audited by Snyk on Apr 8, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill's Debian/Ubuntu install steps explicitly run "sudo git clone https://github.com/openclaw/openclaw.git" and then execute bundled scripts (e.g., ./setup-podman.sh, ./scripts/run-openclaw-podman.sh), so the GitHub URL https://github.com/openclaw/openclaw.git is fetched at runtime and its code is executed as a required dependency.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (medium risk: 0.60). The skill directs the agent to perform server-side hardening tasks (package updates, firewall rules, service setup/restarts, SSH lockdown and config changes) that inherently modify system files and require privileged actions on the host, even though it frames them as remote-host guidance rather than local-only actions.

Issues (2)

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 8, 2026, 12:07 PM
Issues
2