Back to plugin
Pluginv0.3.7
ClawScan security
DeepLake · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousApr 3, 2026, 6:21 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The plugin generally does what it advertises (auto-capture and auto-recall to DeepLake) but it writes credentials to the user's home, modifies OpenClaw config, and the SKILL metadata/instructions understate those side effects — these mismatches warrant caution.
- Guidance
- This plugin legitimately implements a cloud-backed memory: it will automatically capture user and assistant messages and store them in DeepLake, and it uses a device-auth flow that creates and saves tokens under ~/.deeplake/credentials.json. It also edits your OpenClaw config (~/.openclaw/openclaw.json) to ensure it is loaded on restart. Before installing: 1) Confirm you are OK with all conversations being sent to deeplake.ai and shared across agents in the same DeepLake organization; 2) Review DeepLake's privacy/retention policies and your org membership settings; 3) After install, inspect ~/.deeplake/credentials.json and ~/.openclaw/openclaw.json to verify what was written; 4) If you want to limit exposure, disable autoCapture/autoRecall in plugin config or run the plugin in a restricted/sandboxed environment; 5) The SKILL.md claims read-only behavior but the code writes files and modifies config — treat the metadata as incomplete and audit the package source if this matters for your security posture.
Review Dimensions
- Purpose & Capability
- noteThe name/description match the code: the plugin auto-captures assistant/user messages and searches/writes them to DeepLake via REST. There are no unrelated external endpoints or unexpected binaries. Minor mismatch: the agent-facing SKILL metadata indicates read-only behavior (allowed-tools: Read) while the plugin performs writes to disk and network.
- Instruction Scope
- concernThe human-facing SKILL.md and README omit two runtime behaviors present in the code: saving auth tokens to ~/.deeplake/credentials.json and mutating ~/.openclaw/openclaw.json to add load paths. SKILL.md claims 'Zero config' and doesn't explicitly disclose on-disk writes or changes to OpenClaw config. The plugin auto-captures all conversation messages and sends them to DeepLake cloud — this is consistent with purpose but is a broad data-collection action that users should be explicitly warned about.
- Install Mechanism
- okNo external downloads or extract-from-URL installs. Code is included in the package; network use is limited to api.deeplake.ai which matches the stated provider. package.json declares an npm spec but there is no opaque installer URL.
- Credentials
- noteThe skill requests no environment variables and uses a device-auth flow to obtain a token. It stores tokens locally (~/.deeplake/credentials.json) and attempts to create long-lived tokens via the DeepLake API — this is proportionate to providing persistent cloud-backed memory but carries privacy/credential-storage implications (tokens are created and persisted to disk).
- Persistence & Privilege
- concernThe plugin writes credentials to the user's home and mutates the user's OpenClaw configuration (~/.openclaw/openclaw.json) to add plugin load paths so its hooks fire — this modifies global agent config and increases persistence. always:false, but the config mutation is a notable privilege/scope change that should be disclosed to users and admins.
