Scan Report
20 /100
openclaw-continuous-work
Continuous execution and optimization pipeline skill for OpenClaw. Runs naming audits, content/link audits, module validation, reference mapping, and encoding normalization on a target directory.
Legitimate OpenClaw continuous-work/optimization skill with minor documentation gap around subprocess invocation; no malicious patterns found.
Safe to install
Add explicit declaration of subprocess usage in SKILL.md allowed-tools section. Otherwise this skill is safe to deploy.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Low | Subprocess shell execution not declared in allowed-tools Doc Mismatch | Scripts/RunOptimizationPipeline.py:19 |
| Low | Broad filesystem scope not declared Doc Mismatch | Scripts/NamingAudit.py:36 |
| Low | File-writing scripts not declared as requiring filesystem:WRITE Doc Mismatch | Scripts/NormalizeEncoding.py:25 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | NONE | WRITE | ✓ Aligned | Scripts/RunOptimizationPipeline.py:19 (import subprocess) and line 25 (subproces… |
| Filesystem | NONE | READ | ✓ Aligned | NamingAudit.py:36 (root.rglob), ContentLinkAudit.py:52 (root.rglob) — reads file… |
| Filesystem | NONE | WRITE | ✓ Aligned | NormalizeEncoding.py:25-29 (writes normalized bytes), ValidateModuleOrder.py:59 … |
File Tree
27 files · 36.0 KB · 1142 lines Python 8f · 704L
Markdown 15f · 381L
JSON 4f · 57L
├─
▾
References
│ ├─
AcceptanceTemplate.md
Markdown
│ ├─
ConflictReport.json
JSON
│ ├─
ConflictReport.md
Markdown
│ ├─
ContinuousExecutionDirective.md
Markdown
│ ├─
GeneralRules.md
Markdown
│ ├─
ModuleGraph.json
JSON
│ ├─
ModuleGraph.md
Markdown
│ ├─
ModuleOrder.json
JSON
│ ├─
ModuleOrderReport.json
JSON
│ ├─
ModuleOrderReport.md
Markdown
│ ├─
ModuleSystem.md
Markdown
│ ├─
ModuleTemplate.md
Markdown
│ ├─
OptimizationChecklist.md
Markdown
│ ├─
OptimizationDirective.md
Markdown
│ ├─
OptimizationRules.md
Markdown
│ ├─
QualityRubric.md
Markdown
│ ├─
ReferenceMap.md
Markdown
│ └─
ReportingTemplate.md
Markdown
├─
▾
Scripts
│ ├─
BuildModuleGraph.py
Python
│ ├─
BuildReferenceMap.py
Python
│ ├─
ContentLinkAudit.py
Python
│ ├─
DetectRuleConflicts.py
Python
│ ├─
NamingAudit.py
Python
│ ├─
NormalizeEncoding.py
Python
│ ├─
RunOptimizationPipeline.py
Python
│ └─
ValidateModuleOrder.py
Python
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
Python standard library only | N/A | stdlib | No | No third-party packages in requirements.txt or package.json — uses only json, subprocess, pathlib, re, collections, itertools, argparse, argparse |
Security Positives
✓ All scripts use only Python standard library — no third-party dependencies that could introduce supply-chain risk
✓ No network requests (no urllib, requests, httpx, socket to remote IPs)
✓ No credential or environment variable harvesting
✓ No base64/encoded payloads or obfuscation techniques
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env, key stores)
✓ subprocess targets are hardcoded local script paths — no arbitrary command injection
✓ File writes are confined to text/UTF-8 normalization or auto-generated markdown/JSON reports
✓ Grep scan found zero matches for credential keywords, reverse shell patterns, or suspicious network patterns