openclaw-team-bus
Fail
Audited by Snyk on Mar 6, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.80). This is a third‑party GitHub repository from an unverified user and the skill instructs cloning and running Python code (python3 bus.py), which can execute arbitrary code — potentially malicious unless the repository contents are reviewed and trusted.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (medium risk: 0.40). The prompt instructs copying configuration into /root/.openclaw, which implies writing to root-owned paths (actions that typically require sudo/root) even though it doesn't explicitly request privilege escalation or create users.
Audit Metadata