agent-council
Fail
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): The scripts
scripts/rename_channel.pyandscripts/setup_channel.pyprogrammatically read the Discord bot token and Guild ID from the local configuration file located at~/.openclaw/config.json.- [DATA_EXPOSURE] (HIGH): The skill performs unauthorized reading of sensitive configuration files (~/.openclaw/config.json) which contains credentials and system state.- [COMMAND_EXECUTION] (MEDIUM): Thescripts/create-agent.shscript executes multiple host system commands via theopenclawCLI, includinggateway config.patchandcron add, to alter system behavior and persistence.- [INDIRECT_PROMPT_INJECTION] (MEDIUM): Inscripts/create-agent.sh, user-provided arguments such as--specialtyand--nameare directly written intoSOUL.mdusing a here-doc. SinceSOUL.mdserves as the system prompt for the newly created agent, this allows for the injection of malicious instructions into the agent's core identity.- [DATA_EXFILTRATION] (LOW): The scripts transmit the extracted Discord token tohttps://discord.com/api/v10/. While this is consistent with the skill's stated purpose, the handling of raw tokens by local scripts constitutes an exfiltration risk.
Recommendations
- AI detected serious security threats
Audit Metadata