openclaw-config
Fail
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The documentation file
references/agent-creation.mdandSKILL.mdcontain a specific hardcoded Telegram bot token (8794745677:AAGusS8oiSXX8NK1F-CzLKqsGYWQGmDpvw8) within usage examples. - [COMMAND_EXECUTION]: The provided Python scripts (
scripts/create_agent.pyandscripts/add_binding.py) are designed to modify the~/.openclaw/openclaw.jsonconfiguration file, which governs the core behavior and security settings of the OpenClaw gateway. - [DATA_EXFILTRATION]: The skill scripts access and read the contents of the
~/.openclaw/openclaw.jsonfile, exposing sensitive configuration data and bot credentials to the execution environment. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by instructing users to create agent identity files (
SOUL.md,AGENTS.md) using templates from theassets/directory. These files define the agent's core personality and instructions but lack boundary markers or sanitization, potentially allowing external configuration data to influence agent behavior.
Recommendations
- AI detected serious security threats
Audit Metadata