Is iblai/iblai-openclaw-router safe?
https://github.com/iblai/iblai-openclaw-router
This skill implements a legitimate OpenClaw model router with cost optimization features, but exhibits concerning behavior by accessing sensitive credential files during installation. While the core functionality appears benign, the unauthorized file access suggests potential data harvesting capabilities that warrant careful review.
Category Scores
Findings (6)
CRITICAL Access to Multiple Sensitive Credential Files -60 ▶
During installation, the skill accessed multiple sensitive credential files including SSH private keys, AWS credentials, Docker config, npm credentials, and Google Cloud credentials. While no exfiltration was detected, unauthorized access to these files represents a significant security risk.
MEDIUM Systemd Service Installation -15 ▶
The skill installs and runs a systemd service (iblai-router) with network access capabilities on port 8402. This creates a persistent background service that could potentially be misused.
MEDIUM API Traffic Interception Risk -30 ▶
As a proxy service that routes API requests to different models, this skill has the technical capability to intercept, log, or redirect API traffic passing through it. While the stated purpose is legitimate routing, the position as a middleman creates inherent risks.
LOW Honeypot File Access -30 ▶
The skill accessed honeypot credential files during installation but did not modify or exfiltrate their contents. This suggests the installation process may be broader than necessary.
LOW Elevated System Activity -5 ▶
The installation process involves significant system-level activity including service creation and configuration modifications, which increases the attack surface.
LOW Persistent Network Service -20 ▶
The skill establishes a persistent network service that continues running after installation, creating an ongoing attack surface that could be exploited if compromised.