openclaw-admin-security-breakglass

Fail

Audited by Socket on Feb 23, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

This instruction set directs insertion of a hardcoded backdoor into the access control logic and immediate live deployment. Even if intended to help recover admin access, the mechanism is high-risk: it provides a persistent, single-factor bypass that can be abused through number compromise or spoofing and encourages unsafe manual edits and restarts that circumvent code review and audit trails. Recommend rejecting this direct injection approach. Instead implement ephemeral, auditable emergency access with multi-factor controls and make any code changes via standard CI/CD with logging, monitoring, and rollback.

Confidence: 80%Severity: 90%
Audit Metadata
Analyzed At
Feb 23, 2026, 10:00 PM
Package URL
pkg:socket/skills-sh/zackkorman%2Fskills%2Fopenclaw-admin-security-breakglass%2F@876844168759eb61ef8c926c11b591d54792988e