Summary
OpenClaw security audit --deep flags the ClawVault OpenClaw extension as critical risk due to detected shell-exec patterns and env+network patterns in the installed plugin source/dist.
I know static scanners can produce false positives, so this issue is mainly to request maintainer guidance and safer distribution defaults.
Environment
- OpenClaw:
2026.3.1
- Audit command:
openclaw security audit --deep
- Installed plugin path reported by OpenClaw:
~/.openclaw/extensions/clawvault/...
What was flagged (examples)
The audit reports multiple occurrences such as:
dangerous-exec (child_process usage)
env-harvesting (environment variable access combined with network send)
Example files from the report include:
dist/plugin/index.js
src/plugin/index.ts
src/runtime/runtime-openclaw.ts
- various command/runtime files under
src/ and dist/
Requested guidance
Could you clarify:
- Which of these patterns are expected/required for normal ClawVault operation?
- What is the intended threat model for the OpenClaw plugin runtime?
- Recommended hardening for users (least-privilege config, optional feature flags, etc.)?
- Best practice for pinned, trusted installs (exact version pinning/signing/checksums)?
Suggested improvements
- Document why shell execution is needed (if needed) and where.
- Separate privileged features behind explicit opt-in config.
- Provide release artifacts/instructions that are easier to verify and pin.
- Add a security section mapping scanner findings to expected behavior.
Happy to provide the full raw audit output privately if useful.
Summary
OpenClaw
security audit --deepflags the ClawVault OpenClaw extension as critical risk due to detected shell-exec patterns and env+network patterns in the installed plugin source/dist.I know static scanners can produce false positives, so this issue is mainly to request maintainer guidance and safer distribution defaults.
Environment
2026.3.1openclaw security audit --deep~/.openclaw/extensions/clawvault/...What was flagged (examples)
The audit reports multiple occurrences such as:
dangerous-exec(child_process usage)env-harvesting(environment variable access combined with network send)Example files from the report include:
dist/plugin/index.jssrc/plugin/index.tssrc/runtime/runtime-openclaw.tssrc/anddist/Requested guidance
Could you clarify:
Suggested improvements
Happy to provide the full raw audit output privately if useful.