clawsec-suite
Audited by Socket on Apr 18, 2026
2 alerts found:
Anomalyx2This module itself is an installer/activator for a persistent OpenClaw hook. It performs no direct networking, credential access, or code execution beyond invoking the `openclaw` CLI resolved via PATH. The primary security concern is supply-chain/payload risk: it installs and enables bundled hook code into a hidden per-user directory and activates it, so the actual maliciousness (tracking, exfiltration, destructive actions) would reside in the copied hook payload files. Secondary concerns include destructive overwrite of any existing hook directory and lack of verification that the resolved `openclaw` binary is the intended one. Review and verify the contents of the bundled hook payload and ensure `openclaw` execution is trusted/pinned.
Mostly coherent with its stated security-management purpose: advisory polling, signature verification, guarded install flow, and approval-gated remediation all fit. The main risks are transitive remote skill installation and mutable npx-based installs, so this is better classified as suspicious/medium-risk rather than malicious.