Skip to content

OpenClaw security audit flags dangerous exec/env patterns in ClawVault plugin (requesting guidance/hardening) #128

@mikejacksonS2F

Description

@mikejacksonS2F

Summary

OpenClaw security audit --deep flags the ClawVault OpenClaw extension as critical risk due to detected shell-exec patterns and env+network patterns in the installed plugin source/dist.

I know static scanners can produce false positives, so this issue is mainly to request maintainer guidance and safer distribution defaults.

Environment

  • OpenClaw: 2026.3.1
  • Audit command: openclaw security audit --deep
  • Installed plugin path reported by OpenClaw: ~/.openclaw/extensions/clawvault/...

What was flagged (examples)

The audit reports multiple occurrences such as:

  • dangerous-exec (child_process usage)
  • env-harvesting (environment variable access combined with network send)

Example files from the report include:

  • dist/plugin/index.js
  • src/plugin/index.ts
  • src/runtime/runtime-openclaw.ts
  • various command/runtime files under src/ and dist/

Requested guidance

Could you clarify:

  1. Which of these patterns are expected/required for normal ClawVault operation?
  2. What is the intended threat model for the OpenClaw plugin runtime?
  3. Recommended hardening for users (least-privilege config, optional feature flags, etc.)?
  4. Best practice for pinned, trusted installs (exact version pinning/signing/checksums)?

Suggested improvements

  • Document why shell execution is needed (if needed) and where.
  • Separate privileged features behind explicit opt-in config.
  • Provide release artifacts/instructions that are easier to verify and pin.
  • Add a security section mapping scanner findings to expected behavior.

Happy to provide the full raw audit output privately if useful.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions