credential-manager
Audited by Socket on Feb 19, 2026
1 alert found:
Security[Skill Scanner] Credential file access detected All findings: [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] This skill's stated purpose, documented capabilities, and the described operations are internally consistent: it legitimately scans local credential files, backs them up, consolidates them into ~/.openclaw/.env, sets restrictive permissions, and enforces usage by other skills. The primary security concern is scope and centralization: the tool requires broad filesystem access and becomes a single point of failure / single point of compromise for many high-value secrets. That increases risk if the scripts themselves are tampered with or if the host is compromised. There is no evidence in the provided documentation of network exfiltration, obfuscated code, or explicit malicious behavior, but the powerful privileges and mandatory enforcement behavior warrant caution and code review of the actual implementation before trust. Recommended next steps: review the actual scripts (scan.py, consolidate.py, validate.py, enforce.py, cleanup.py) for any network calls, logging of secrets, deletion logic, and confirm backups and restore procedures. Consider adding encryption-at-rest (OS keyring or encrypted file) and minimum-privilege scanning where possible. LLM verification: The credential consolidation approach is coherent and aligns with a centralized, secure-by-default secret management model. It presents a balanced mix of security controls (600 permissions, gitignore protection, backups) and operational procedures (validation, templates, cleanup). However, its aggressive centralization and reliance on multiple memory-pattern sources introduce operational rigidity and potential data-provenance concerns. The design is prudent but should include explicit safeguards