api-provider-setup
Warn
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/sync-agent-auth.shutilizespython3 -cto run Python code snippets built by directly interpolating shell variables like$TARGET_PROVIDERand$new_key. This creates a code injection vulnerability where a maliciously crafted provider name or API key containing single quotes could execute arbitrary Python code with the user's local permissions. - [CREDENTIALS_UNSAFE]: This skill manages sensitive, plaintext API keys within the
~/.openclawdirectory. While necessary for the skill's utility, the lack of secure storage (e.g., encryption or a keyring) combined with the command execution vulnerability in the sync script creates a high-risk surface for credential theft or modification.
Audit Metadata