Scan Report
72 /100
claw-ops-manager
OpenClaw operations management center with audit logging, snapshots, and rollback
The skill executes arbitrary shell commands via subprocess without explicit declaration, monitors and snapshots sensitive credential paths (~/.ssh, /etc/ssh) without stated justification, and includes documentation examples of destructive commands.
Do not install this skill
Do not deploy without major security rework. The skill requires explicit shell:WRITE permission declaration, removal of sensitive paths from auto-snapshot configuration, and clear documentation explaining why credential directories are monitored.
Findings 5 items
| Severity | Finding | Location |
|---|---|---|
| High | Undeclared Shell Command Execution Priv Escalation | scripts/audited_ops.py:240 |
| High | Sensitive Credential Paths in Auto-Snapshot Sensitive Access | scripts/audited_ops.py:36 |
| High | Sensitive Paths in Default Protected Paths Sensitive Access | scripts/init.py:114 |
| Medium | Shell Eval Usage in Wrapper RCE | scripts/audit_wrapper.sh:55 |
| Medium | Dangerous Command Examples in Documentation Doc Mismatch | COMPLETED_v2.md:10 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | NONE | WRITE | ✗ Violation | scripts/audited_ops.py:240 - subprocess.run(command, shell=True) |
| Filesystem | READ | WRITE | ✗ Violation | scripts/audited_ops.py:262-270 - writes files for snapshots |
| Environment | NONE | READ | ✗ Violation | scripts/audited_ops.py:28 - os.environ.get('USER'), scripts/auto_audit.py:26 - o… |
2 Critical 7 findings
Critical Dangerous Command 危险 Shell 命令
rm -rf ~ COMPLETED_v2.md:10 Critical Dangerous Command 危险 Shell 命令
rm -rf / MARKETING.md:45 Medium External URL 外部 URL
https://img.shields.io/badge/ClawHub-v2.0.0-667eea?style=for-the-badge MARKETING.md:97 Medium External URL 外部 URL
https://clawhub.com/package/claw-ops-manager MARKETING.md:97 Medium External URL 外部 URL
https://img.shields.io/badge/ClawHub-v2.0.0-667eea OPTIMIZED_METADATA.md:101 Medium External URL 外部 URL
https://cdn.plot.ly/plotly-latest.min.js assets/templates/dashboard.html:7 Info Email 邮箱地址
[email protected] scripts/snapshot.py:37 File Tree
27 files · 333.4 KB · 10830 lines Python 13f · 7147L
HTML 3f · 1777L
Markdown 7f · 1461L
Shell 2f · 258L
JSON 2f · 187L
├─
▾
assets
│ └─
▾
templates
│ ├─
dashboard_v2.html
HTML
│ ├─
dashboard_v3.html
HTML
│ └─
dashboard.html
HTML
├─
▾
references
│ └─
api.md
Markdown
├─
▾
scripts
│ ├─
audit_wrapper.sh
Shell
│ ├─
audited_ops.py
Python
│ ├─
auto_audit.py
Python
│ ├─
describer.py
Python
│ ├─
init.py
Python
│ ├─
logger.py
Python
│ ├─
monitor.py
Python
│ ├─
rollback.py
Python
│ ├─
server_full.py
Python
│ ├─
server_simple.py
Python
│ ├─
server_v2.py
Python
│ ├─
server_v3.py
Python
│ ├─
server.py
Python
│ ├─
setup_auto_audit.sh
Shell
│ └─
snapshot.py
Python
├─
▾
translations
│ └─
operations.json
JSON
├─
_meta.json
JSON
├─
COMPLETED_v2.md
Markdown
├─
INTEGRATION.md
Markdown
├─
MARKETING.md
Markdown
├─
OPTIMIZED_METADATA.md
Markdown
├─
SKILL.md
Markdown
└─
USAGE_v2.md
Markdown
Dependencies 3 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
flask | not specified | pip | No | Listed in SKILL.md dependencies but not pinned |
watchdog | not specified | pip | No | Listed in SKILL.md dependencies but not pinned |
plotly | not specified | pip | No | Listed in SKILL.md dependencies but not pinned |
Security Positives
✓ No credential harvesting or exfiltration code detected
✓ No network exfiltration to external servers
✓ No base64 encoding or obfuscated malicious code
✓ No reverse shell or C2 communication patterns
✓ No hidden HTML comments with malicious instructions
✓ Includes permission checking before operations
✓ Database uses SQLite with proper schema design
✓ Supports dry-run mode for rollback operations