Back to plugin
Pluginv0.1.4

ClawScan security

Accountability Verification · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignApr 28, 2026, 9:08 PM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The skill's code and runtime behavior are consistent with its stated purpose (post‑hoc verification of files written by agents); it reads local files and resolves imports but does not request unrelated credentials or make unexpected network calls.
Guidance
This plugin appears to do what it claims: after tools write files it checks existence, optionally runs TypeScript/JS syntax checks, and verifies local imports. Before installing, consider the privacy implications: the plugin reads the contents of files the agent writes (and probes whether their local imports exist), so any secrets or sensitive data written by agents would be read by this plugin. If you do not want file contents inspected, disable syntaxCheck/importCheck in the plugin config or do not install the plugin. The plugin will only update openclaw-ftal if that optional package is present; there are no network exfiltration calls in the code. If you need higher assurance, review the listed source files yourself or run the plugin in a restricted test environment first.

Review Dimensions

Purpose & Capability
okName/description match the implementation: the plugin registers an after_tool_call handler, extracts file paths from tool params/patches/shell redirects, checks existence, optionally runs a TypeScript/JS syntax check and resolves local imports, and optionally updates openclaw-ftal confidence. No unrelated environment variables, binaries, or remote endpoints are required.
Instruction Scope
noteThe handler will read files written by the agent (readFileSync/existsSync) and, when enabled, parse their contents and check referenced local imports. That behavior is coherent with the stated purpose, but it does mean the plugin will access the contents and existence of files (and probe local import paths). If those files could contain sensitive data, this is a privacy consideration. There are no instructions that read unrelated env vars or transmit data to external endpoints.
Install Mechanism
okNo install spec is provided (instruction-only plugin), and package.json lists only a small runtime dependency (zod). A pnpm lockfile is included (dev dependencies pull in many packages via the OpenClaw dev peer), but there's no off‑platform URL downloads or archived installers. Runtime behavior relies on dynamic imports (typescript and openclaw-ftal) which are optional.
Credentials
okThe skill declares no required environment variables or credentials. It dynamically imports optional peer packages (typescript, openclaw-ftal) but does not request AWS or other unrelated credentials. It accesses only file system paths that correspond to agent-written files and their local imports.
Persistence & Privilege
okThe plugin uses the normal model-invocation flow: it registers an event handler during plugin registration. always is false and it does not modify other skills' configs. It will update openclaw-ftal state if that optional package is present, which is a scoped and explained integration.