Scan Report
18 /100
rtk-rewrite
OpenClaw plugin that intercepts exec tool calls and rewrites commands via `rtk rewrite` for token optimization
Plugin delegates shell command rewriting to an external `rtk` binary with no credential access or data exfiltration; includes a documented but risky curl|sh installation pattern in README.
Safe to install
Approve with caution: Review the `rtk` binary trustworthiness before deployment. Consider pinning the install script to a specific commit hash to mitigate supply chain risk.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Curl-pipe-sh installation instruction Supply Chain | README.md:20 |
| Low | Undeclared shell execution via execFileSync Doc Mismatch | index.ts:17 |
| Low | Homepage mismatch between files Doc Mismatch | openclaw.plugin.json, SKILL.md:3 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | NONE | WRITE | ✗ Violation | index.ts:17 execFileSync('rtk', ['rewrite', cmd]) |
| Filesystem | NONE | WRITE | ✗ Violation | index.ts:18-19 appendFileSync, mkdirSync for audit logs |
1 Critical 1 findings
Critical Dangerous Command 危险 Shell 命令
curl -fsSL https://raw.githubusercontent.com/rtk-ai/rtk/refs/heads/master/install.sh | sh README.md:20 File Tree
4 files · 9.3 KB · 339 lines Markdown 2f · 189L
TypeScript 1f · 111L
JSON 1f · 39L
├─
index.ts
TypeScript
├─
openclaw.plugin.json
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ No credential harvesting or environment variable iteration observed
✓ Audit logs only contain command rewrites, no sensitive data exfiltration
✓ execFileSync uses explicit arguments array (not shell injection-prone string)
✓ Error handling prevents information leakage on ENOENT or status 1
✓ MIT license with publicly available source code