acc-error-memory
Fail
Audited by Gen Agent Trust Hub on Feb 23, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (HIGH): The script
scripts/haiku-screen.shparses theACC_MODELSenvironment variable and executes the resulting strings as commands viasubprocess.run. This allows for the execution of arbitrary system binaries with user-controlled parameters, posing a major risk if the environment is compromised or influenced by other skills. - EXTERNAL_DOWNLOADS (MEDIUM): The
scripts/encode-pipeline.shscript attempts to callscripts/calibrate-patterns.sh, which is absent from the provided skill files. This reference to an external/missing script prevents full security verification and could be used to execute unvetted code at runtime. - PROMPT_INJECTION (LOW): The skill is vulnerable to indirect prompt injection because it processes untrusted user input from session transcripts without sanitization or boundary enforcement.
- Ingestion points: Session transcripts are extracted by
scripts/preprocess-errors.shfrom~/.openclaw/sessions/. - Boundary markers: No delimiters or 'ignore' instructions are used in the generated
ACC_STATE.mdcontext file or the screening prompt inscripts/haiku-screen.sh. - Capability inventory: The pipeline has the ability to execute shell commands and modify the local filesystem.
- Sanitization: No escaping or filtering is applied to the conversation snippets before they are interpolated into prompts or stored in the state JSON.
Recommendations
- AI detected serious security threats
Audit Metadata