unclawg-internet
Fail
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: HIGHDATA_EXFILTRATIONCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: Sensitive token exposure via URL query parameters.
- The skill uses the
opencommand to send anaccess_tokenandrefresh_tokentohttps://unclawg.com/auth/cli-callback. This is a high-risk practice as it leaks credentials to local process logs, browser history, and network proxies. - [CREDENTIALS_UNSAFE]: Handling and local storage of secrets.
- The skill manages
OPENCLAW_MACHINE_SECRET,ACCESS_TOKEN, andREFRESH_TOKENduring the onboarding flow. - It writes these secrets to
.claude/agents/${AGENT_ID}.env. While.envfiles are standard for local management, the automated creation of credential files is a sensitive operation. - [COMMAND_EXECUTION]: Extensive shell command usage.
- The skill relies on shell commands including
curlfor API interaction,mkdirandcatfor file system modification, andpython3for inline JSON encoding. - The
!dynamic context injection is not present, but the instructions provide raw bash scripts for the agent to execute. - [EXTERNAL_DOWNLOADS]: Network operations to external API.
- The skill makes multiple
POSTandPUTrequests tohttps://api.unclawg.comandhttps://unclawg.comto provision account resources and push configuration data. - [PROMPT_INJECTION]: Indirect prompt injection vulnerability.
- Ingestion points: User-supplied email, agent name, and content from external URLs fetched via Task subagents in the 'Soul Interview' phase.
- Boundary markers: Absent. The skill does not define clear delimiters or instruction-bypass warnings when processing the fetched content.
- Capability inventory: Subprocess calls via
curl, file system writes (mkdir,cat,cat > .claude/agents/...), and network exfiltration potential via thecurlcommands inSKILL.md. - Sanitization: Partial. It uses an inline Python script to JSON-encode the 'soul' content before sending it to the API, which mitigates simple schema confusion but does not prevent instruction injection.
Recommendations
- AI detected serious security threats
Audit Metadata