auth-manager

Fail

Audited by Gen Agent Trust Hub on Mar 5, 2026

Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The skill configuration file located at ~/.openclaw/auth-platforms.json explicitly includes a credentials object designed to store username and password fields in plaintext. Storing sensitive authentication secrets without encryption or a secure vault presents a significant risk of credential exposure if the local file system is accessed.
  • [COMMAND_EXECUTION]: The skill instructions involve the execution of various shell commands, including pkill, mkdir, timeout, and the fast-browser-use utility. These commands use string interpolation for platform IDs and URLs, which creates a risk of command injection if the source data for these variables is not strictly controlled. Furthermore, the pkill command uses a broad pattern matching chrome.*--remote-debugging, which may inadvertently terminate unrelated browser processes.
  • [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface. Ingestion point: The fast-browser-use snapshot command retrieves the DOM of external websites specified by check_url (e.g., in auth-platforms.json). Boundary markers: No delimiters or protective instructions are used to isolate the scraped content from the agent's logic. Capability inventory: The skill has the ability to interact with processes (process.write), manage files, and control browser sessions. Sanitization: No evidence of escaping or filtering of HTML content is present. An attacker could host a website that, when checked for status, provides malicious instructions to the agent within the DOM.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 5, 2026, 07:55 AM