Scan Report
45 /100
hostlink
Execute commands on the host machine from inside the OpenClaw container via HostLink daemon
Skill provides documented but undeclared shell:WRITE access to the host system with no allowed-tools declaration, and HOSTLINK_TOKEN authentication credential is central to its operation without explicit handling warnings.
Use with caution
Add explicit allowed-tools declaration (shell:WRITE) and document security implications, including that HOSTLINK_TOKEN is a critical credential enabling root command execution on the host.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| Medium | No allowed-tools declaration despite full shell access Doc Mismatch | SKILL.md:1 |
| Medium | Root-level host command execution undeclared in security terms Priv Escalation | references/setup.md:92 |
| Medium | HOSTLINK_TOKEN critical credential without handling guidance Credential Theft | SKILL.md:17 |
| Low | Documents access to sensitive host paths Sensitive Access | SKILL.md:38 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | NONE | WRITE | ✗ Violation | SKILL.md:1 - All examples use 'hostlink exec' for arbitrary shell commands |
| Filesystem | NONE | READ | ✗ Violation | SKILL.md:35-36 - Documents 'hostlink exec ls /home/jebadiah/projects', 'cat /etc… |
| Environment | NONE | READ | ✗ Violation | SKILL.md:24 - Documents 'hostlink -e MY_VAR=value' for setting env vars, which i… |
| Network | NONE | READ | ✗ Violation | SKILL.md:8 - Supports TCP/WireGuard remote access; references external connectio… |
File Tree
2 files · 7.2 KB · 270 lines Markdown 2f · 270L
├─
▾
references
│ └─
setup.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ Skill has comprehensive documentation of its capabilities and architecture
✓ Authentication mechanism (token-based) is documented
✓ Uses Unix socket by default (local-only without TCP exposure)
✓ Exit codes are well-defined for error handling
✓ Includes troubleshooting guidance for common issues