openclaw-wiki
Fail
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Remote Code Execution (CRITICAL): Multiple documentation files, including
docs/start/getting-started.mdanddocs/install/index.md, recommend installing the software using piped remote script execution (e.g.,curl -fsSL https://openclaw.ai/install.sh | bashandiwr -useb https://openclaw.ai/install.ps1 | iex). The domainopenclaw.aiis not included in the trusted external sources list, and this pattern is a high-risk attack vector. - Command Execution (HIGH): The skill documents the
exectool and an/elevatedcommand suite (docs/tools/exec.md,docs/tools/elevated.md). Notably, the/elevated fulldirective is documented to allow an AI agent to execute commands on the host gateway or node while explicitly bypassing user-configured approval prompts and allowlists. - External Downloads (MEDIUM): The documentation frequently directs users to download binaries and plugins from various external repositories and registries (e.g., GitHub, npm) without enforcing checksum or signature verification in the primary setup paths.
- Indirect Prompt Injection (LOW): As a gateway for third-party messaging apps like WhatsApp and Telegram, the system has a large attack surface for indirect prompt injection.
- Ingestion points:
SKILL.mdanddocs/channels/index.mdlist numerous external messaging platforms as input sources. - Boundary markers:
docs/automation/gmail-pubsub.mdmentions 'external-content safety boundaries', but these are not applied universally to all channels. - Capability inventory: The
exec,write,browser, andcameratools provide significant capability for an attacker to exploit via successful injection. - Sanitization:
docs/concepts/agent-loop.mdmentions sanitization of tool results, but static analysis cannot confirm runtime effectiveness against malicious message payloads.
Recommendations
- AI detected serious security threats
Audit Metadata