openclaw-inter-instance
Fail
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides explicit instructions and examples for executing arbitrary shell commands on remote nodes via the
nodes.runtool, specifically recommendingbash -cfor complex tasks andenv -ufor bypassing proxy settings. - [REMOTE_CODE_EXECUTION]: The skill is designed to enable remote execution across OpenClaw instances, allowing one agent to trigger script and command execution on paired remote machines.
- [PROMPT_INJECTION]: The documentation includes a section on 'GLM-5 Identity Coverage' which instructs the use of 'CRITICAL IDENTITY' declarations to override a model's default persona and internal instructions.
- [EXTERNAL_DOWNLOADS]: The skill provides examples for cloning external git repositories onto remote instances using
git clone. - [DATA_EXFILTRATION]: The skill documents methods to access and transmit sensitive data, including local configuration files like
~/.openclaw/openclaw.jsonand agent memory files, across different instances and nodes.
Recommendations
- AI detected serious security threats
Audit Metadata