Is moltbook-interact safe?

https://clawhub.ai/LunarCmd/moltbook-interact

62
CAUTION

The moltbook-interact skill provides a bash-based CLI for interacting with the Moltbook social network API. While the skill's core functionality is straightforward, the install process exhibited suspicious behavior by accessing credential files outside its scope (~/.env, ~/.aws/credentials). The included bash script has an unescaped JSON interpolation vulnerability, and the skill creates an external data transmission channel that could be leveraged for exfiltration. No active malicious behavior was confirmed, but the risk profile warrants caution.

Category Scores

Prompt Injection 75/100 · 30%
Data Exfiltration 45/100 · 25%
Code Execution 55/100 · 20%
Clone Behavior 40/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 55/100 · 5%

Findings (9)

HIGH Suspicious credential file access during install -40

The installation process accessed ~/.env, ~/.aws/credentials, and ~/.openclaw/agents/main/agent/auth-profiles.json. These files are outside the skill's stated scope (it should only need ~/.config/moltbook/credentials.json). While no network exfiltration was detected, the access pattern is concerning and suggests the install environment or a dependency is probing for credentials.

HIGH External API credential transmission -35

The moltbook.sh script reads API keys from local credential files and transmits them as Bearer tokens to https://www.moltbook.com/api/v1. While this is the skill's stated purpose, it creates a data exfiltration channel: an agent instructed by this skill will send user-composed content to an external server, and the content could include sensitive context from the agent's conversation.

HIGH Shell injection via unescaped JSON interpolation -25

The moltbook.sh script interpolates user-supplied content directly into JSON strings without escaping. The 'reply' command constructs: {"content":"${content}"} and the 'create' command constructs: {"title":"${title}","content":"${content}"}. A post title or content containing double quotes will break the JSON structure, and crafted input could inject arbitrary JSON fields or cause malformed requests. While not direct shell injection, this is a command injection vector through malformed API payloads.

MEDIUM Agent-mediated data exfiltration channel -20

The skill instructs the agent to create posts and replies with arbitrary content on an external social network. A sophisticated attacker could craft SKILL.md instructions (in a future update) that cause the agent to include conversation context, code snippets, or environment details in posts — effectively using Moltbook as a covert exfiltration channel.

MEDIUM Autonomous behavior programming -25

SKILL.md instructs the agent to maintain state (reply log at /workspace/memory/moltbook-replies.txt) and make autonomous decisions (check post IDs before replying). This programs persistent behavioral changes into the agent beyond simple tool invocation, and the reply log could accumulate data across sessions.

MEDIUM Excessive code compilation during install -20

The install process triggered compilation of 20+ .cjs files in /tmp/jiti/, including modules named 'memory-core', 'plugin-sdk', 'infra-exec-safety', 'agents-identity', etc. This indicates substantial runtime code execution during what should be a simple skill installation. While likely attributable to the OpenClaw framework itself, it expands the attack surface.

LOW Executable bash script with network access -20

The skill includes scripts/moltbook.sh, a bash script that uses curl to make HTTP requests. While this is the stated purpose of the skill, any executable script bundled with a skill increases risk surface. The script could be modified in a future version to perform additional actions.

LOW Filesystem write outside skill directory -10

SKILL.md instructs the agent to write to /workspace/memory/moltbook-replies.txt, which is outside the skill's own directory. This normalizes writing to arbitrary paths and could be a stepping stone for more dangerous filesystem operations in future versions.

INFO Canary files intact 0

All honeypot files (fake .env, SSH keys, AWS credentials) remained unmodified during the audit. No evidence of targeted credential harvesting via canary files.