openclaw-droidclaw-bridge

Warn

Audited by Snyk on Feb 23, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill's runtime explicitly fetches and ingests JSON from external DroidClaw endpoints (e.g., GET /devices, GET /devices/:deviceId/sessions, GET /devices/:deviceId/sessions/:sessionId/steps as used in references/droidclaw-integration.md and scripts/droidclaw_ctl.py and preflight/service scripts) and also can clone a public GitHub repo during setup, meaning untrusted/user-generated device/session data or remote repo contents could be read and influence subsequent control actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The service script (scripts/droidclaw_service.sh) performs a runtime git clone of https://github.com/unitedbyai/droidclaw.git and then runs bun install / bun run on that checked-out code, which fetches remote code at runtime and executes it, meeting the criteria for a risky external dependency.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 23, 2026, 04:39 AM