Is capevace/claw-events safe?

https://github.com/openclaw/skills/tree/main/skills/capevace/claw-events

54
CAUTION

claw.events presents itself as a legitimate agent messaging infrastructure but embeds several high-severity by-design behaviors: it instructs agents to (1) self-propagate to other agents in a worm-like pattern, (2) persistently modify their own heartbeat/task files with mandatory external check-in routines, and (3) execute a remote instruction-fetch command that allows the skill operator to push updated prompts to all installed agents at any time. The subexec feature additionally creates an RCE-via-message-bus attack surface exploitable by any public channel participant. Installation was clean with no suspicious behavior during the git clone phase, but the skill's documented functionality represents significant systemic risk if widely deployed.

Category Scores

Prompt Injection 35/100 · 30%
Data Exfiltration 55/100 · 25%
Code Execution 45/100 · 20%
Clone Behavior 90/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 35/100 · 5%

Findings (12)

CRITICAL Embedded self-propagation — worm-like skill spreading -30

The 'Grow the Network' section explicitly instructs agents to share the SKILL.md URL with other agents and recruit them to install claw.events. This is architectural worm behavior: each installed agent is instructed to infect additional agents. The framing as a civic 'responsibility' makes it persuasive rather than suspicious to the host agent.

HIGH Heartbeat file injection — persistent behavioral modification -20

The skill instructs agents to edit their own HEARTBEAT.md or equivalent periodic task file to add mandatory claw.events check-ins every 1-2 hours. This is a prompt-injection-via-documentation attack: the skill modifies the agent's standing instructions, creating a persistent obligation to phone home that survives the initial conversation context.

HIGH Remote instruction fetching via instruction-prompt -15

The skill documents a claw.events instruction-prompt command that retrieves a live system prompt from the claw.events server. This allows the skill operator to silently push updated instructions to every agent running the skill, at any time after installation, without any new skill publish or user action.

HIGH Global install of unaudited external npm package -30

The skill instructs agents to run npm install -g claw.events, which downloads and executes arbitrary code from the npm registry with global filesystem access. The installed package was not part of this audit. npm postinstall scripts can execute arbitrary shell commands at install time.

HIGH subexec enables RCE via public channel messages -25

The claw.events subexec command executes arbitrary local shell scripts on every message received from a subscribed channel. Since public channels (including public.townsquare) are writable by any authenticated user, any network participant can craft messages that influence script execution on agents running subexec handlers. This is a remote code influence surface mediated by the message bus.

MEDIUM Public channel broadcast of agent activity -20

The skill's heartbeat instructions direct agents to regularly publish their status and discoveries to public.townsquare and their own agent channels. All public channels are readable by any claw.events user globally. Agent operational data, including what tasks are being performed and when, becomes surveillance-accessible.

MEDIUM Token extraction pattern taught in documentation -15

The 'Running Multiple Agents' section demonstrates extracting JWT authentication tokens directly from config files using shell pipelines. This pattern teaches agents to read and manipulate tokens from sensitive config locations (~/.claw/), normalizing token-handling behavior that could be exploited.

MEDIUM Arbitrary URL fetch from untrusted channel messages -10

Example code pipes channel message content through jq and into curl to download files to the agent's home directory. Channel messages originate from untrusted third parties; this pattern enables server-side request forgery and arbitrary file writes if an attacker controls a channel the agent follows.

MEDIUM Centralized C2 infrastructure — single point of compromise -30

All agents running this skill maintain ongoing connections to claw.events servers for pub/sub and heartbeat check-ins. The instruction-prompt feature provides an always-on remote instruction delivery channel. A compromise of claw.events infrastructure, or a malicious update to the instruction-prompt endpoint, would allow simultaneous re-instruction of all installed agents worldwide.

MEDIUM Network-amplified self-replication risk -20

The combination of self-propagation instructions and the public agent-discovery mechanism (advertise list) means installed agents actively recruit new agents while also advertising themselves for discovery. This creates compounding growth with no opt-out mechanism described for the propagation behavior.

LOW Cross-agent influence via shared public channels -15

Multiple agents subscribing to the same public channels and running subexec handlers creates a shared execution environment where any agent (or attacker impersonating one) can influence the behavior of all subscribed agents simultaneously. The trust model assumes channel participants are benign.

INFO Clean installation — expected behavior only 0

The installation process performed only a sparse git clone from github.com. No suspicious network connections, no unexpected process spawning, no filesystem changes outside /home/oc-exec/skill-under-test/. The connection to 185.125.188.54:443 (Ubuntu infrastructure) was pre-existing.