Skip to content
← Registry
Trust Report

openclaw-checkpoint

Backup and restore OpenClaw workspace state and agents across machines using git. Enables disaster recovery by syncing SOUL.md, MEMORY.md, memory files, cron jobs, agents (~/.openclaw/agents/), and configuration to a remote repository. Use when user wants to checkpoint their OpenClaw state, restore on a new machine, migrate between computers, or protect against data loss. Provides commands checkpoint (help overview), checkpoint-setup (interactive onboarding), checkpoint-backup, checkpoint-restore (with interactive checkpoint selection or --latest for most recent), checkpoint-schedule (auto-backup), checkpoint-stop, checkpoint-status, checkpoint-init, and checkpoint-reset. Supports multi-agent backup with flags --workspace-only, --agents-only, and --agent <name>. Automatically backs up cron jobs to memory/cron-jobs-backup.json on each checkpoint-backup.

73
SUSPICIOUS
Format: openclawScanner: v0.8.0Duration: 26msScanned: 10d ago · Apr 30, 9:29 AMSource →
Embed this badge
AgentVerus SUSPICIOUS 73AgentVerus SUSPICIOUS 73AgentVerus SUSPICIOUS 73
[![AgentVerus](https://agentverus.ai/api/v1/skill/2cd9a4c8-9312-4827-8a0a-f5344ef72a65/badge)](https://agentverus.ai/skill/2cd9a4c8-9312-4827-8a0a-f5344ef72a65)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/2cd9a4c8-9312-4827-8a0a-f5344ef72a65/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"2cd9a4c8-9312-4827-8a0a-f5344ef72a65","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/2cd9a4c8-9312-4827-8a0a-f5344ef72a65/trust

Category Scores

48
Permissions
95
Injection
82
Dependencies
53
Behavioral
70
Content
80
Code Safety

Findings (17)

lowNo explicit safety boundaries-10

The skill does not include explicit safety boundaries defining what it should NOT do.

No safety boundary patterns found

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09
highCapability contract mismatch: inferred command execution is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: exec

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred system modification is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: crontab

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highDownload-and-execute pattern (curl|wget pipe to shell)-20

Piping a downloaded script directly to a shell interpreter. This executes remote code without verification — a classic supply chain attack vector.

curl -fsSL https://raw.githubusercontent.com/AnthonyFrancis/openclaw-checkpoint/main/scripts/install-openclaw-checkpoint…

Review the code block starting at line 47. Ensure this pattern is necessary and does not pose a security risk.

code-safetyASST-04
highPersistent session reuse detected-15

Found persistent session reuse pattern: "background daemon"

The skill does **not** install any background daemons, system services, or root-level processes. All scheduling runs under your user account.

Call out when browser or auth state persists across commands. Reused authenticated sessions should require explicit user consent and clear cleanup guidance.

behavioralASST-05
mediumCapability contract mismatch: inferred file write is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: Create ~/.openclaw/workspace

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumCapability contract mismatch: inferred file read is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: references/

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://github.com/AnthonyFrancis/openclaw-checkpoint.git

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
mediumCapability contract mismatch: inferred documentation ingestion is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: See [references/

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumCredential access detected (inside threat-listing context)-5

Found credential access pattern: "cat > ~/.openclaw/workspace/.env"

cat > ~/.openclaw/workspace/.env.thisweek << 'EOF'

Remove references to credentials and secrets. Skills should never access sensitive authentication data.

injectionASST-05
mediumExternal documentation dependency-8

The skill relies on external documentation, specs, or README content as part of its workflow, which introduces an additional remote dependency and trust boundary.

README.md

Review which external services or providers the skill depends on, what data crosses that boundary, and whether the dependency is necessary for the intended workflow.

dependenciesASST-04
mediumSystem modification detected (inside code block)-6

Found system modification pattern: "crontab -e"

crontab -e

Skills should not modify system configuration or install packages globally. Bundle required dependencies.

behavioralASST-03
mediumSystem modification detected (inside code block)-6

Found system modification pattern: "~/.zshrc"

# Add to PATH (also add to ~/.zshrc or ~/.bashrc for persistence)

Skills should not modify system configuration or install packages globally. Bundle required dependencies.

behavioralASST-03
mediumFederated auth flow detected-10

Found federated auth flow pattern: "OAuth" Related auth/profile context: - overlapping signals from the repeated finding family — Federated auth flow detected

**Not synced** (security): API keys (.env.*), credentials, OAuth tokens

Treat OAuth, 2FA, and token-refresh guidance as authentication-sensitive workflows. Explain scope, storage, and refresh behavior clearly so agents do not handle more credential material than necessary.

behavioralASST-05
mediumRaw content URL reference-10

The skill references a raw content hosting service which is classified as medium risk.

https://raw.githubusercontent.com/AnthonyFrancis/openclaw-checkpoint/main/scripts/install-openclaw-checkpoint.sh

Use official package registries instead of raw content URLs. Raw URLs can be changed without notice.

dependenciesASST-04
lowDownload-and-execute pattern detected (known installer)

The skill references a well-known installer script in its setup instructions.

curl -fsSL https://raw.githubusercontent.com/AnthonyFrancis/openclaw-checkpoint/main/scripts/install-openclaw-checkpoint.sh | bash

Consider documenting the exact version or hash of the installer for supply chain verification.

dependenciesASST-04
lowInstall pattern: download and execute from remote URL (in setup section)

The skill contains a curl-pipe-to-shell pattern in its setup/prerequisites section.

curl -fsSL https://raw.githubusercontent.com/AnthonyFrancis/openclaw-checkpoint/main/scripts/install-openclaw-checkpoint.sh | bash

Consider pinning the installer to a specific version or hash for supply chain verification.

behavioralASST-02