openclaw

Warn

Audited by Snyk on Mar 5, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill’s docs (see references/automation/webhook and references/automation/gmail-pubsub) show the Gateway accepts external HTTP/webhook and Gmail Pub/Sub payloads (e.g., POST /hooks/agent and mapped /hooks/gmail) and runs isolated agent turns or executes BOOT.md content, meaning untrusted, user-generated third‑party content is ingested and directly interpreted by the agent as part of its workflow.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.70). The skill documentation includes privileged installation steps (npm -g, "onboard --install-daemon", daemon/service and proxy/deploy instructions) that imply creating/modifying system services and system-level files and so could push an agent or user to change the machine state; it does not explicitly request sudo or user-creation but clearly covers actions that affect system services/configuration.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 5, 2026, 10:23 AM