扫描报告
5 /100
claw-rpg
D&D 3.5 RPG character system for AI lobster agents — reads SOUL.md/MEMORY.md, tracks XP, levels up, sends Telegram reports, fires flavor text
Claw RPG is a legitimate D&D 3.5-style character growth system for AI agents. It reads workspace files, tracks XP in a local JSON save, fires flavor text, and optionally sends Telegram notifications via the local OpenClaw gateway. No malicious behavior, credential theft, or unauthorized network exfiltration was found.
可以安装
Approve for use. This is a safe, well-structured RPG gamification layer with no security concerns.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | SKILL.md mentions execSync example but scripts don't use it 文档欺骗 | SKILL.md:67 |
| 低危 | Reads workspace metadata files for language detection 敏感访问 | scripts/_notify.mjs:67 |
| 提示 | Reads OpenClaw gateway config for local integration 敏感访问 | scripts/_notify.mjs:13 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | WRITE | ✓ 一致 | All file writes are confined to DATA_DIR (workspace/claw-rpg/) and character.jso… |
| 网络访问 | READ | READ | ✓ 一致 | Only localhost connections to OpenClaw gateway (port 18789) for Telegram push no… |
| 命令执行 | NONE | NONE | — | No child_process.execSync/exec calls in any script. easter.mjs uses dynamic impo… |
| 环境变量 | NONE | NONE | — | os.environ not iterated; only USERPROFILE/HOME used for path resolution |
| 技能调用 | NONE | NONE | — | No cross-skill invocation or sandbox escape |
| 剪贴板 | NONE | NONE | — | No clipboard access detected |
| 浏览器 | NONE | NONE | — | Dashboard server binds to localhost:3500 only; no browser automation |
| 数据库 | NONE | NONE | — | No database access |
8 项发现
中危 外部 URL 外部 URL
https://openclaw.ai README.md:3 中危 外部 URL 外部 URL
https://img.shields.io/badge/ClawhHub-claw--rpg-orange README.md:5 中危 外部 URL 外部 URL
https://clawhub.ai/RAMBOXIE/claw-rpg README.md:5 中危 外部 URL 外部 URL
https://img.shields.io/badge/version-2.3.0-blue README.md:5 中危 外部 URL 外部 URL
https://img.shields.io/badge/License-MIT--0-blue README.md:5 中危 外部 URL 外部 URL
https://babeljs.io/ dashboard/README.md:7 中危 外部 URL 外部 URL
https://vite.dev/guide/rolldown dashboard/README.md:7 中危 外部 URL 外部 URL
https://react.dev/learn/react-compiler/installation dashboard/README.md:12 目录结构
39 文件 · 162.0 KB · 4261 行 JavaScript 15f · 2400L
Markdown 11f · 808L
CSS 2f · 485L
TypeScript 3f · 428L
JSON 5f · 127L
HTML 1f · 13L
├─
▾
assets
│ └─
level-table.json
JSON
├─
▾
dashboard
│ ├─
▾
public
│ │ └─
vite.svg
│ ├─
▾
src
│ │ ├─
▾
assets
│ │ │ └─
react.svg
│ │ ├─
App.css
CSS
│ │ ├─
App.tsx
TypeScript
│ │ ├─
index.css
CSS
│ │ └─
main.tsx
TypeScript
│ ├─
eslint.config.js
JavaScript
│ ├─
index.html
HTML
│ ├─
package.json
JSON
│ ├─
README.md
Markdown
│ ├─
server.js
JavaScript
│ ├─
tsconfig.app.json
JSON
│ ├─
tsconfig.json
JSON
│ ├─
tsconfig.node.json
JSON
│ └─
vite.config.ts
TypeScript
├─
▾
memory
│ └─
2026-03-16.md
Markdown
├─
▾
references
│ ├─
abilities.md
Markdown
│ ├─
classes.md
Markdown
│ └─
prestige.md
Markdown
├─
▾
scripts
│ ├─
_formulas.mjs
JavaScript
│ ├─
_notify.mjs
JavaScript
│ ├─
_paths.mjs
JavaScript
│ ├─
arena.mjs
JavaScript
│ ├─
easter.mjs
JavaScript
│ ├─
greet.mjs
JavaScript
│ ├─
init.mjs
JavaScript
│ ├─
levelup.mjs
JavaScript
│ ├─
report.mjs
JavaScript
│ ├─
setup-cron.mjs
JavaScript
│ ├─
sheet.mjs
JavaScript
│ ├─
sync-xp-recovery.mjs
JavaScript
│ └─
xp.mjs
JavaScript
├─
AGENTS.md
Markdown
├─
MEMORY.md
Markdown
├─
README.md
Markdown
├─
SKILL.md
Markdown
├─
SOUL.md
Markdown
└─
USER.md
Markdown
依赖分析 6 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
express | ^5.2.1 | npm | 否 | Standard web framework, version reasonably pinned |
cors | ^2.8.6 | npm | 否 | Well-maintained middleware |
react | ^19.2.0 | npm | 否 | Latest stable React |
recharts | ^3.8.0 | npm | 否 | Charting library, no known vulnerabilities |
vite | ^7.3.1 | npm | 否 | Latest Vite |
typescript | ~5.9.3 | npm | 否 | Tilde pin, minor version flexible |
安全亮点
✓ All file writes are sandboxed to the workspace claw-rpg directory (workspace/claw-rpg/character.json)
✓ Network access is strictly localhost-only (OpenClaw gateway on port 18789)
✓ No child_process.execSync/exec usage anywhere — shell:WRITE is not exercised
✓ Gateway token is used only for local API calls, never transmitted externally
✓ No base64 encoding, obfuscation, or eval() patterns
✓ No credential harvesting — only reads a local gateway config for integration
✓ No sensitive paths (~/.ssh, ~/.aws, .env) are accessed
✓ No curl|bash or remote script execution
✓ Dependencies are all well-known, pinned packages (express, react, cors, recharts)
✓ XP recovery uses hardcoded token estimates (400/200) and cannot steal real tokens
✓ Dashboard binds only to localhost:3500 with no external exposure