migrate-from-openclaw

Warn

Audited by Socket on Apr 26, 2026

2 alerts found:

Securityx2
SecurityMEDIUM
scripts/extract-channel-credentials.ts

No overt malware/backdoor behavior is present in the provided fragment (no network activity, no command execution, no dynamic code execution). However, the utility is security-sensitive: it resolves credentials from local config and environment variables and can optionally write the resolved secrets (full values) to an arbitrary file path specified by --write-env, while also emitting credential-adjacent information to logs (presence/source and partial masks). This creates meaningful risk in CI/logging or when CLI arguments/state directories are not strictly controlled.

Confidence: 66%Severity: 70%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill's behavior mostly matches its migration purpose, but it has a large trust footprint. The main concerns are raw credential extraction/writing, inherited third-party skills/plugins, and optional pnpm dlx installation of MCP packages from legacy config. This looks like a powerful migration helper with medium-high security risk, not confirmed malware.

Confidence: 87%Severity: 72%
Audit Metadata
Analyzed At
Apr 26, 2026, 09:53 PM
Package URL
pkg:socket/skills-sh/qwibitai%2Fnanoclaw%2Fmigrate-from-openclaw%2F@a744ba7bd7706fb94753f0bb43baea848b5ff35a