Claw-Hunter by Backslash Security
- ✅ Reads configuration files
- ✅ Checks for running processes
- ✅ Scans for potential secrets in text files
- ✅ Reports security findings
- ❌ Modify any system configurations
- ❌ Change file permissions
- ❌ Stop or start services
- ❌ Delete or move files
- ❌ Make network connections (except optional upload)
The audit script may access and report on:
- OpenClaw configuration files (may contain API keys)
- Process information (PIDs, command lines)
- File paths and metadata
- System information (hostname, serial number) Important:
- The script does NOT extract actual API keys or secrets, only flags their potential presence
- All data stays local unless
--upload-urlis explicitly used - Log files may contain file paths but not file contents
If using --upload-url to send results to a central API:
- Use HTTPS: Always use HTTPS endpoints
- Secure API Keys: Store API keys in files with restricted permissions (600)
- Review Data: Audit what data is being sent (check JSON output first)
- Network Segmentation: Ensure upload endpoint is on trusted network
- Authentication: Always use
--api-key-filefor authenticated uploads
When deploying via MDM:
- Least Privilege: Script runs as root/SYSTEM but performs read-only operations
- Secure Storage: Store scripts in protected directories (
/usr/local/bin,C:\Program Files) - API Key Management:
- Store keys in
/etc/(Unix) orC:\ProgramData(Windows) - Set permissions to 600 (Unix) or restricted ACL (Windows)
- Rotate keys regularly
- Store keys in
- Log Security: Protect log files containing system information
- Network Security: If uploading, use VPN or private network
Bash (macOS/Linux):
- Read access to
~/.openclaw/directory - Read access to
/usr/local/bin/openclaw(or install location) - Root/sudo for:
- Serial number extraction
- System-wide process listing (optional)
- Writing to
/var/log/(MDM mode) PowerShell (Windows):
- Read access to
%USERPROFILE%\.openclawdirectory - Administrator for:
- WMI queries (serial number)
- Scheduled task enumeration
- Writing to
C:\ProgramData(MDM mode)
Backslash Security takes security seriously. If you discover a security vulnerability in Claw-Hunter, please follow responsible disclosure: Contact Backslash Security:
- Email: hello@backslash.security
- Website: https://backslash.security/contact
- Execution of arbitrary code
- Unauthorized file system modifications
- Information disclosure beyond intended scope
- Authentication bypass in upload functionality
- Privilege escalation
- Denial of service vulnerabilities
- Detection of OpenClaw security issues (that's the tool's purpose)
- False positives in secret scanning
- Compatibility issues
- Feature requests
DO NOT open a public GitHub issue for security vulnerabilities. Instead:
- Email: Send details to hello@backslash.security
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Your contact information
- Response Timeline:
- Initial response: Within 48 hours
- Status update: Within 7 days
- Fix timeline: Depends on severity (critical: 7-14 days)
- We will acknowledge receipt of your report
- We will investigate and provide updates
- We will credit you in the security advisory (unless you prefer to remain anonymous)
- We will coordinate public disclosure after a fix is available
- Vulnerability confirmed
- Fix developed and tested
- Security advisory published (GitHub Security Advisories)
- Patch released
- Public disclosure (after reasonable time for users to update)
- Download from Official Sources: Only download from official GitHub repository
- Verify Integrity: Check SHA256 hashes if provided
- Review Code: Scripts are open source - review before running
- Test First: Test in non-production environment
- Keep Updated: Use latest version for security fixes
# Good: Secure API key file
echo "your-api-key" > /etc/openclaw-audit-key
chmod 600 /etc/openclaw-audit-key
chown root:root /etc/openclaw-audit-key
# Bad: World-readable key
echo "your-api-key" > ~/api-key.txt # Don't do this!/usr/local/bin/claw-hunter.sh # Requires root to modify
~/scripts/claw-hunter.sh # Any user can modify
chmod 640 /var/log/claw-hunter.log chown root:adm /var/log/claw-hunter.log
cat > /etc/logrotate.d/openclaw-audit << EOF /var/log/claw-hunter.log { weekly rotate 4 compress missingok notifempty }
- Secret Scanning: Pattern-based detection may have false positives/negatives
- Bash 3.2: Limited regex capabilities compared to modern versions
- Network Detection: May not detect all network configurations
- Process Detection: Depends on process naming conventions
All script executions can be logged:
./claw-hunter.sh --mdm --log-file /var/log/claw-hunter.log
grep "Starting OpenClaw security audit" /var/log/claw-hunter.log
Last Updated: 2026-02-02
Version: 1.0.0