Back to plugin
Pluginv2026.3.22

ClawScan security

Matrix · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 23, 2026, 9:58 PM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The package appears to implement a Matrix channel plugin and its code, dependencies, and runtime behavior match that purpose; there are no obvious mismatches or covert exfiltration mechanisms in the provided files.
Guidance
This plugin is coherent with its stated purpose (Matrix channel integration). Before installing: 1) Decide which Matrix auth mode you'll use — password/token or env-backed — and avoid setting broad MATRIX_* env vars if you don't want the plugin to pick them up. 2) Review where your agent stores state/config (stateDir) because access tokens or derived credentials may be written there; consider using a dedicated Matrix service account with limited privileges. 3) Install from the official npm/registry source you trust and review package.json and the code (already provided) if you need to confirm no network endpoints beyond Matrix homeservers are contacted. 4) Because the plugin can be invoked autonomously by the agent (default behavior), ensure you trust the plugin and the homeserver accounts it will use; rotate tokens if you stop using the plugin. If you want tighter guarantees, run the plugin in a sandboxed agent or review the specific files that handle credential storage and network calls (resolveMatrixAuth, MatrixAuthedHttpClient, resolveMatrixCredentialsPath).
Findings
[system-prompt-override] unexpected: A prompt-injection pattern was detected in the SKILL.md scanner. The SKILL.md content provided is package.json and openclaw metadata; this is likely a false positive from the regex scanner rather than an actual system-prompt override attempt. Still, the finding should be treated as a signal to review any free-form README or runtime instructions for unusual prompt-mangling text.

Review Dimensions

Purpose & Capability
okName/description match the code and declared dependencies (matrix-js-sdk, matrix-sdk-crypto-nodejs, fake-indexeddb, etc.). The code is Matrix-specific (clients, directory lookups, crypto bootstrap, onboarding, CLI) and the requested npm deps are consistent with that functionality.
Instruction Scope
noteSKILL.md (package.json content) and runtime code instruct the plugin to read/writes its own OpenClaw config and stateDir, read optional Matrix-related env vars (e.g., MATRIX_*), and call Matrix homeserver APIs. This is expected for a channel plugin but the registry metadata lists no required env vars while the code conditionally uses environment variables for auth; users should note the plugin will read those env vars if present and will persist credentials to the agent's state directory.
Install Mechanism
okNo external download URLs or extract steps are present. Dependencies are standard npm packages. The package includes openclaw.install metadata pointing to an npm spec/local path, which is appropriate for an OpenClaw plugin.
Credentials
noteThe skill declares no required env vars, but the code supports optional MATRIX_* env vars for env-backed accounts and will read those if present. It also stores credentials under the agent stateDir (functions resolveMatrixCredentialsPath / resolveMatrixAccountStorageRoot). This behavior is proportional to a Matrix channel plugin but users should be aware tokens may be written to disk by the plugin.
Persistence & Privilege
okalways is false and the skill does not request elevated platform privileges. It registers gateway methods and CLI hooks and reads/writes its own config/state via the plugin runtime API — expected behavior for a channel plugin and scoped to the plugin's config/state.