Scan Report
15 /100
openclaw-shield-upx
Security monitoring and threat detection for OpenClaw agents powered by Google SecOps (Chronicle)
OpenClaw Shield is a legitimate security monitoring skill that provides CLI-based commands for Shield plugin management with no direct code execution or credential access.
Safe to install
This skill is safe to use. The `rm -rf ~/.openclaw/shield/` command is documented in the Uninstalling section and requires user-initiated execution. The external telemetry claim should be verified against the plugin's actual behavior rather than this skill.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Info | External telemetry reference | SKILL.md:104 |
| Info | Pre-scan IOC: rm -rf ~ | SKILL.md:190 |
| Info | Output handling constraints | SKILL.md:96 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | NONE | — | No Read/Write operations in skill |
| Network | NONE | NONE | — | External telemetry handled by plugin, not skill |
| Shell | NONE | NONE | — | No subprocess/bash calls; only openclaw CLI invocations |
| Environment | NONE | NONE | — | Skill explicitly forbids reading env vars |
| Skill Invoke | NONE | NONE | — | No skill-internal invocations |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | NONE | NONE | — | No browser automation |
| Database | NONE | NONE | — | No database access |
1 Critical 6 findings
Critical Dangerous Command 危险 Shell 命令
rm -rf ~ SKILL.md:190 Medium External URL 外部 URL
https://www.upx.com README.md:3 Medium External URL 外部 URL
https://www.npmjs.com/package/@upx-us/shield README.md:18 Medium External URL 外部 URL
https://www.upx.com/en/lp/openclaw-shield-upx README.md:19 Medium External URL 外部 URL
https://clawhub.ai/brunopradof/openclaw-shield-upx README.md:34 Medium External URL 外部 URL
https://uss.upx.com README.md:35 File Tree
2 files · 14.8 KB · 241 lines Markdown 2f · 241L
├─
README.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ No executable scripts or code files — purely documentation
✓ Explicitly forbids reading filesystem paths or environment variables for state checks
✓ Requires explicit user approval before resolving cases
✓ Output handling rules prevent raw log exfiltration
✓ No credential handling — delegated to plugin's installation key
✓ Clear state machine (A/B/C/D) for Shield status interpretation