remote-openclaw-deploy
Fail
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/deploy.shautomatically configures the remote OpenClaw instance withtools.execset tosecurity: "full"andask: "off". This grants the deployed agents the capability to execute arbitrary shell commands on the remote host without any user confirmation or restriction. - [REMOTE_CODE_EXECUTION]: The deployment process relies on SSH to transfer files and execute arbitrary shell commands and Python scripts on a remote target machine. While this is the intended functionality of a deployment tool, it provides a powerful primitive for remote code execution.
- [CREDENTIALS_UNSAFE]: The skill architecture utilizes a
deploy.jsonfile designed to store sensitive credentials such asapiKey,appSecret, andtokenin plain text. Thedeploy.shscript transmits these secrets to the remote machine, where they are stored in theopenclaw.jsonconfiguration file. - [EXTERNAL_DOWNLOADS]: The script uses
tarover SSH to transfer the entire contents of a local project directory (including agents, skills, and workspace files) to a remote server. This involves mass file transfer and remote installation of executable content.
Recommendations
- AI detected serious security threats
Audit Metadata