Files
openclaw/skills/ai-persona-os/SECURITY_NOTE.md
2026-03-03 01:03:53 +03:00

2.1 KiB

Security Note — AI Persona OS

Some automated security scanners (e.g. VirusTotal Code Insight) may flag this skill due to heuristic pattern matching. This document explains why those flags are false positives.

What scanners detect vs. what the code actually does

"Crypto key handling patterns"

  • Trigger: scripts/security-audit.sh contains regex patterns like api_key, secret_key, access_token, etc.
  • Reality: This script searches your workspace for accidentally leaked credentials. It does not store, transmit, or handle any secrets. All checks are local grep scans with no network calls.
  • Trigger: examples/coding-assistant/KNOWLEDGE.md references environment variable names like YOUR_API_KEY and DATABASE_URL.
  • Reality: These are placeholder names in a documentation template — no actual credentials are present.

"External API calls"

  • Trigger: Code examples in examples/coding-assistant/KNOWLEDGE.md show a TypeScript fetch() pattern.
  • Reality: This is an illustrative code snippet (/api/endpoint is not a real URL). No files in this skill make any network requests.
  • Trigger: URLs to jeffjhunter.com and aimoneygroup.com appear in attribution footers.
  • Reality: These are the author's homepage links in documentation — not API endpoints.

"Eval or dynamic code execution"

  • Trigger: Words like "execute," "execution," and "execute commands" appear frequently in documentation.
  • Reality: These describe the concept of AI agent task execution within the persona framework. There are zero eval(), exec(), or dynamic code execution calls in any script.

Verification

You can verify this yourself:

# Confirm no eval/exec calls exist
grep -rn "eval\|exec(" scripts/ --include="*.sh"

# Confirm no network calls exist in scripts
grep -rn "curl\|wget\|nc \|netcat\|/dev/tcp" scripts/ --include="*.sh"

# Review the security audit script directly
cat scripts/security-audit.sh

Questions?

If you have security concerns, please open an issue or contact the author directly.