openclaw-admin-security-breakglass
Fail
Audited by Socket on Feb 23, 2026
1 alert found:
MalwareMalwareSKILL.md
HIGHMalwareHIGH
SKILL.md
This instruction set directs insertion of a hardcoded backdoor into the access control logic and immediate live deployment. Even if intended to help recover admin access, the mechanism is high-risk: it provides a persistent, single-factor bypass that can be abused through number compromise or spoofing and encourages unsafe manual edits and restarts that circumvent code review and audit trails. Recommend rejecting this direct injection approach. Instead implement ephemeral, auditable emergency access with multi-factor controls and make any code changes via standard CI/CD with logging, monitoring, and rollback.
Confidence: 80%Severity: 90%
Audit Metadata