openclaw-extend

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
references/node-pairing.md

This document describes a legitimate remote-management architecture with powerful capabilities (remote shell, media/location capture). As documentation, it contains no executable code or direct signs of malware. The principal risks are operational: improper admin approvals, weak token/credential management, lack of per-capability scoping, absence of audit/logging and sandboxing, and potential transport/session compromise. Recommend: (1) review actual implementation code for token handling, authentication, authorization, session management, and command execution sandboxing; (2) adopt per-capability, time-limited pairing and mandatory audit logs; (3) require strong admin authentication (MFA) and consider multi-admin approval for new nodes; (4) encrypt media in transit and at rest, and implement consent/notification and retention policies; (5) implement anomaly detection for approvals and unusual command/media access patterns.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 16, 2026, 03:28 AM
Package URL
pkg:socket/skills-sh/anthemflynn%2Fccmp%2Fopenclaw-extend%2F@a8f9e9336ca6d4969a771eed5eb1bddc07762e22