openclaw-relay

Warn

Audited by Snyk on Mar 15, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill directly fetches and parses messages from OpenClaw sessions (see list_sessions_payload -> run_openclaw(["sessions","--json"]), fetch_session, run_acpx/run_target_exec and the trimmed_session/simplify_message/maybe_parse_embedded_json code) and the session aliases explicitly target external channels (e.g., discord in config/session_aliases.json), so untrusted user-generated session content is read and interpreted as part of workflows like ask/publish and can influence subsequent actions.

Issues (1)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 15, 2026, 02:13 PM
Issues
1