clawdcursor
Fail
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill programmatically accesses and parses sensitive configuration files containing API keys and auth profiles, specifically targeting paths such as
~/.openclaw/agents/main/agent/auth-profiles.jsonand~/.openclaw/openclaw.json(implemented insrc/openclaw-credentials.ts). It also manages keys through local.envfiles. - [COMMAND_EXECUTION]: The skill frequently spawns system-level processes to perform desktop automation. It executes PowerShell scripts with
-ExecutionPolicy Bypasson Windows and Bash scripts on macOS (seesrc/ui-driver.ts). The filescripts/mac/find-element.jxais encoded in UTF-16 Little Endian with a Byte Order Mark (BOM) and null-byte padding, a technique that can be used to hide malicious logic from ASCII/UTF-8 centric security tools. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8). It ingests untrusted natural language tasks from the agent context and processes them using a powerful 'Computer Use' toolset that has full desktop GUI and system shell access. While
src/safety.tsprovides basic pattern blocking, it does not provide robust isolation between untrusted input and the high-privilege execution environment. - [EXTERNAL_DOWNLOADS]: Automated security scanners have flagged the vendor domain
clawdcursor.com(referenced inREADME.mdandSKILL.md) as appearing on a blacklist.
Recommendations
- HIGH: Downloads and executes remote code from: http://127.0.0.1:${opts.port}/task - DO NOT USE without thorough review
- Contains 2 malicious URL(s) - DO NOT USE
Audit Metadata