openclaw-backup
Warn
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE]: The backup script targets
openclaw.jsonand theagentsconfiguration directories. Despite documentation stating that credentials are not backed up, these files are the standard locations for storing API keys and authentication tokens in the OpenClaw platform. - [COMMAND_EXECUTION]: The
restore.pyscript uses thetarfile.extractall()method without security filters. This makes the system vulnerable to directory traversal attacks, where a malicious backup file could be crafted to overwrite arbitrary files on the user's filesystem during the restoration process. - [DATA_EXFILTRATION]: The skill's documentation encourages users to push their
.tar.gzbackups to GitHub. Given that these archives likely contain sensitive platform credentials, this practice significantly increases the risk of secret exposure if the repository is not strictly secured.
Audit Metadata