openclaw
bengii-gemini-fix · v · by
57.3
Trust Score
0
Trust Tier
danger
Badge
Score Breakdown
| Factor | Score | Weight |
|---|---|---|
| Static | 40.0 | 15% |
| Permission | 95.0 | 15% |
| Poison | 80.0 | 15% |
| Clickfix | 100.0 | 15% |
| Credential | 5.0 | 15% |
| Twostage | 5.0 | 10% |
| Infrastructure | 70.0 | 5% |
| Typosquat | 100.0 | 5% |
| Age | 10.6 | 3% |
| Popularity | 0.0 | 2% |
Scan Results
STATIC — Score: 40
[CRITICAL] Remote code download and execution via curl pipe
(line 279)
curl -fsSL https://openclaw.ai/install.sh | bash
[CRITICAL] Remote script download piped to shell execution
(line 279)
curl -fsSL https://openclaw.ai/install.sh | bash
PERMISSION — Score: 95
[LOW] Skill appears to use network but declares no permissions
POISON — Score: 80
[HIGH] Content contains alarming words not in description: override
CLICKFIX — Score: 100
No findings.
INFRASTRUCTURE — Score: 70
[HIGH] Direct IP URL with no domain (likely C2 server)
(line 125)
- Dashboard: `http://127.0.0.1:18789/`
TWOSTAGE — Score: 5
[CRITICAL] Download piped directly to interpreter (two-stage loader)
(line 279)
curl -fsSL https://openclaw.ai/install.sh | bash
CREDENTIAL — Score: 5
[CRITICAL] OpenClaw config file theft — the #1 ClawHavoc target
(line 350)
| `Embedding provider authentication failed (401)` | `.env` has placeholder API key (e.g. `your-jina-api-key-here`) | Re
TYPOSQUAT — Score: 100
No findings.