openclaw-client-bootstrap
Fail
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The installation and bootstrap scripts use the piped-to-shell pattern to execute remote code from external sources.
- Evidence:
assets/client-kit/scripts/01-bootstrap-do.shexecutescurl -fsSL https://deb.nodesource.com/setup_22.x | bashto install Node.js. - Evidence:
assets/client-kit/scripts/02-install-tailscale.shexecutescurl -fsSL https://tailscale.com/install.sh | shto install Tailscale. - Evidence:
assets/client-kit/scripts/03-install-openclaw.shexecutescurl -fsSL https://openclaw.ai/install.sh | bashto install the OpenClaw CLI. - [COMMAND_EXECUTION]: The skill generates and executes shell commands on remote hosts via SSH for configuration and management.
- Evidence:
scripts/talk.shandscripts/update-oauth-token.shconstruct complex shell strings containing environment variables and logic, which are then piped tosshfor remote execution. - Evidence:
assets/client-kit/scripts/05-setup-collab-tmux.shand other bootstrap scripts usesudoto perform high-privilege system operations, such as modifying/etc/ssh/sshd_config.d/and enabling system services. - [EXTERNAL_DOWNLOADS]: Fetches binaries and repository configurations from various external sources.
- Evidence: Fetches Node.js distribution from
deb.nodesource.comand Docker keys/repositories fromdownload.docker.com. - Evidence: Fetches Tailscale components from
tailscale.com. - [CREDENTIALS_UNSAFE]: The
update-oauth-token.shscript is designed to read local sensitive files (like~/.codex/auth.json) and transmit the extracted tokens to a remote droplet to update environment variables. - [INDIRECT_PROMPT_INJECTION]: The skill establishes an attack surface where the agent's behavior is guided by markdown files (
SOUL.md,AGENTS.md) and tool outputs that could potentially be influenced by untrusted data if the server is compromised. - Ingestion points:
openclaw.json,SOUL.md,AGENTS.md, andUSER.md(read from the filesystem at runtime). - Boundary markers: The skill encourages the use of an allowlist for commands (
tools.exec.security: "allowlist") and explicit human approval (ask: "always") for execution, which serves as a significant security control. - Capability inventory: File reading, subprocess execution via
exec(gated), and network operations via the gateway. - Sanitization: No explicit content sanitization is described for the prompts derived from the identity files.
Recommendations
- HIGH: Downloads and executes remote code from: https://openclaw.ai/install.sh, https://deb.nodesource.com/setup_22.x, https://tailscale.com/install.sh - DO NOT USE without thorough review
Audit Metadata