openclaw-team-bus

Fail

Audited by Snyk on Mar 6, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.80). This is a third‑party GitHub repository from an unverified user and the skill instructs cloning and running Python code (python3 bus.py), which can execute arbitrary code — potentially malicious unless the repository contents are reviewed and trusted.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (medium risk: 0.40). The prompt instructs copying configuration into /root/.openclaw, which implies writing to root-owned paths (actions that typically require sudo/root) even though it doesn't explicitly request privilege escalation or create users.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 6, 2026, 07:53 AM