扫描报告
5 /100
credential-vault
Encrypted credential storage for OpenClaw agents
Legitimate encrypted credential storage tool with solid AES-256-GCM cryptography, clear documentation, no network exfiltration, and no malicious behavior detected.
可以安装
This skill is safe to use. The flagged IOCs are test credentials in test files (expected) and a documentation URL - neither represents a security risk in production.
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | scripts/vault.py:1 - Creates ~/.openclaw/vault/vault.enc.json |
| 环境变量 | READ | NONE | ✓ 一致 | SKILL.md mentions VAULT_MASTER_PASSWORD but code doesn't access os.environ |
| 命令执行 | NONE | NONE | — | No subprocess or shell execution found |
| 网络访问 | NONE | NONE | — | SKILL.md explicitly states 'Local only — No network sync (by design)' |
2 高危 3 项发现
高危 API 密钥 疑似硬编码凭证
password = "test-password-12345" tests/test_roundtrip.py:23 高危 API 密钥 疑似硬编码凭证
password = "correct-password" tests/test_roundtrip.py:78 中危 外部 URL 外部 URL
https://openclaw.com README.md:353 目录结构
13 文件 · 52.9 KB · 2028 行 Markdown 3f · 1003L
Python 9f · 1002L
TOML 1f · 23L
├─
▾
lib
│ ├─
__init__.py
Python
│ ├─
audit.py
Python
│ ├─
crypto.py
Python
│ ├─
expiry.py
Python
│ └─
store.py
Python
├─
▾
scripts
│ ├─
__init__.py
Python
│ └─
vault.py
Python
├─
▾
tests
│ ├─
__init__.py
Python
│ └─
test_roundtrip.py
Python
├─
EXAMPLE.md
Markdown
├─
pyproject.toml
TOML
├─
README.md
Markdown
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
cryptography | >=43.0.0 | pip | 否 | Uses minimum version constraint; recommend pinning to specific version |
pytest | >=8.0.0 | pip (dev) | 否 | Dev-only dependency |
安全亮点
✓ Solid AES-256-GCM encryption with PBKDF2 (600,000 iterations) per OWASP recommendations
✓ Clear documentation with threat model explaining what is and isn't protected
✓ No network requests or data exfiltration
✓ Audit logging that explicitly excludes credential values
✓ Uses reputable cryptography library (pyca/cryptography)
✓ Secure file permissions (0600) set on vault file
✓ No credential harvesting from environment or sensitive paths
✓ No obfuscation or base64-encoded payloads
✓ Session key automatically cleared on lock command
✓ All functionality declared in SKILL.md