alibabacloud-sas-openclaw-security
Audited by Socket on Apr 1, 2026
2 alerts found:
Anomalyx2No direct malware logic (e.g., exfiltration, persistence, or obfuscated payloads) is evident in this module. However, the tool is inherently high-impact because it forwards user-supplied shell commands to remote ECS instances, and it stores/prints the full remote command output (which may contain secrets). The regex blacklist provides partial blocking but is not an allowlist and is likely bypassable via unhandled shell constructs/variants. Additionally, sys.path.insert alters import precedence and increases supply-chain/import hijack risk if the filesystem/workspace is untrusted. Overall, this is likely legitimate administrative tooling but carries a moderate-to-high security risk when used or packaged improperly.
No direct evidence of explicit malware behavior (e.g., exfiltration, credential theft, persistence, cryptomining, or obfuscated payload execution) is present in this fragment. However, the module implements a high-impact control-plane pattern: it fetches a shell installation payload (InstallKey) from an external API and executes it on user-specified ECS instances via a bash -c wrapper using a cloud “RunShellScript”-style mechanism. This makes the security posture highly dependent on upstream trust, the integrity/constraints of InstallKey, and the security of AiscClient/EcsClient. Additional risks include runtime sys.path modification (import-hijack surface) and persisting command/output/error artifacts to disk (possible sensitive data retention). Reliability concerns exist due to an undefined variable in the snippet (key_result), suggesting incomplete code context.