Is proactive-solvr safe?

https://clawhub.ai/fcavalcantirj/proactive-solvr

62
CAUTION

Proactive-solvr is a legitimate agent enhancement skill with real functionality (onboarding, heartbeats, collective knowledge). However, it introduces significant security concerns: it instructs the agent to operate autonomously without asking permission, automatically posts error context and work progress to an external API (api.solvr.dev), and implements a soul persistence mechanism that creates a persistent prompt injection vector via external identity rehydration. The skill's broad data exfiltration surface (automatic error posting, approach lifecycle, identity upload) combined with autonomous operation directives materially weaken the user's control over what information leaves their environment.

Category Scores

Prompt Injection 45/100 · 30%
Data Exfiltration 50/100 · 25%
Code Execution 70/100 · 20%
Clone Behavior 90/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 40/100 · 5%

Findings (14)

HIGH Autonomous operation directive overrides safety defaults -20

AGENTS.md contains 'Don't ask permission. Just do it' which instructs the agent to bypass default confirmation behaviors. This is a behavioral override that weakens the user's control over agent actions, particularly dangerous when combined with external API posting and config modification capabilities.

HIGH External identity rehydration from API at session start -20

AGENTS.md instructs the agent to fetch identity data from api.solvr.dev/v1/me/posts and merge it into SOUL.md before proceeding with any work. If the Solvr API is compromised or the user's account is hijacked, malicious instructions could be injected into the agent's identity, effectively achieving persistent prompt injection that survives workspace wipes.

HIGH Automatic error posting to external API -25

The Error Protocol instructs the agent to automatically search and POST to api.solvr.dev on ANY error, exception, or unexpected behavior. Error messages frequently contain sensitive information (file paths, internal URLs, stack traces, environment details). While guidelines say to sanitize, the automatic nature and broad trigger ('ANY error') make leakage likely.

HIGH Soul persistence uploads identity context to external service -15

The soul persistence mechanism uploads the agent's identity (which accumulates user context, preferences, and work patterns) to api.solvr.dev. This data persists externally and is tagged with 'identity' and 'soul' tags, making it searchable. The agent's identity inevitably contains information derived from user interactions.

MEDIUM Config modification without per-change user consent -15

The onboarding flow and config-enforce.sh apply configuration changes via 'gateway config.patch' immediately after user answers, and the --fix flag auto-applies corrections. While config changes map to user answers, the mechanism modifies system configuration without explicit confirmation for each change. The agent is instructed: 'If you only record without applying, onboarding is broken.'

MEDIUM Solvr approach lifecycle transmits work context externally -10

The approach lifecycle requires the agent to POST progress updates, status changes, and verification results to api.solvr.dev for every problem being worked on. This creates a continuous stream of work context being sent to an external service, including problem descriptions and solution attempts.

MEDIUM Shell scripts modify system configuration -15

config-enforce.sh with --fix flag executes openclaw gateway config.patch commands that directly modify the user's openclaw configuration. While the script checks onboarding answers, it operates on the config file at $HOME/.openclaw/openclaw.json, modifying heartbeat intervals, thinking defaults, timezone settings, and reasoning visibility.

MEDIUM Pre-commit hook installation modifies git behavior -10

The skill recommends installing pre-commit-secrets.sh as a git hook. While the script itself appears benign (scanning for secret patterns), installing git hooks modifies the development workflow and could be updated in future versions to execute arbitrary code on every commit.

MEDIUM AWS credentials file accessed during install -10

Filesystem monitoring shows /home/oc-exec/.aws/credentials was opened and accessed during the install process. While this may be part of the openclaw gateway startup (which reads various config files), accessing AWS credentials during a skill install is concerning and warrants investigation.

MEDIUM Compromised Solvr API enables persistent agent hijacking -25

The combination of soul persistence (uploading identity to Solvr) and automatic rehydration (downloading and merging identity at session start) creates a persistent attack vector. If an attacker gains access to the user's Solvr account, they can modify the agent's identity posts to include malicious instructions that will be automatically merged into SOUL.md at every fresh session start.

LOW Solvr content treated as actionable suggestions -5

While the security-patterns.md correctly notes Solvr content should be treated as 'community data — helpful but not authoritative', the main SKILL.md's workflow says 'Found? → Use it, move on' — suggesting the agent should act on Solvr results without verification in practice. This inconsistency could lead to indirect prompt injection via Solvr posts.

LOW Scripts use set +e allowing partial execution -5

Three of four scripts use 'set +e' which continues execution after errors. While this is intentional for audit scripts that should complete all checks, it means partially failed operations are not caught, potentially leaving the system in an inconsistent state.

INFO Gateway health monitoring reads system metrics -5

The heartbeat system reads system metrics (ps aux, uptime, free -m) for health monitoring. While these are read-only operations, they expose system state information that could be included in error reports posted to Solvr.

INFO Skill amplifies prompt injection risk when combined with other skills -15

The automatic error posting and Solvr search behaviors mean that if another skill triggers errors or fetches malicious content, this skill will automatically post the context to Solvr and potentially retrieve attacker-crafted 'solutions' in return. It serves as an amplifier for attacks originating from other components.