jarvis-mission-control
Warn
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The resource management module (
server/resource-manager.js) provides a 'Credentials Vault' designed to store API keys and secrets. However, the current implementation stores these sensitive values in plaintext JSON files within the.mission-control/credentials/directory. Although code comments indicate encryption is intended for production, the current code exposes credentials to anyone with access to the local data directory. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its automated task creation features.
- Ingestion points:
server/telegram-bridge.jsparses Telegram group messages for mentions, andserver/agent-bridge.jsparses OpenClaw session logs. Content from these untrusted sources is used to populate task titles and descriptions. - Boundary markers: There are no explicit delimiters or instructions to ignore embedded commands when the agent processes tasks created from these sources.
- Capability inventory: The system includes whitelisted command execution (
/api/cli/run), file system write operations, and outgoing webhook notifications. - Sanitization: A basic
sanitizeInputhelper inserver/index.jsstrips common injection symbols like backticks and pipes, but it does not mitigate logical prompt injection attacks. - [COMMAND_EXECUTION]: The server provides an API endpoint (
/api/cli/run) that allows the dashboard to execute system commands likeuptime,df, andfree, as well as OpenClaw control commands. While restricted by a hardcoded whitelist, this creates a mechanism for system interaction that must be monitored. - [EXTERNAL_DOWNLOADS]: The
scripts/update-mission-control.shscript downloads a code archive frommissiondeck.aiand extracts it to update the system. This is a primary function of the skill but involves remote code retrieval.
Audit Metadata