Scanned on 2/7/2026
Well-implemented security practices with proper input validation, rate limiting, and credential handling; minor concerns around API endpoint trust and error handling.
This OpenClaw skill demonstrates strong security fundamentals with a trust score of 85/100. The code implements multiple defense-in-depth layers: input sanitization with strict allowlisting, URL validation restricting to HTTPS and specific domains, proper credential management via environment variables, and rate limiting to prevent abuse. The automated findings correctly identify environment variable access and hardcoded endpoints, but these are implemented securely in context. The environment variable access is for legitimate API key retrieval (not exfiltration), and the hardcoded endpoint is to a known weather service. No data exfiltration risks, credential theft attempts, dangerous code execution, or obfuscation were detected. Minor improvements could include runtime API key validation, persistent rate limiting, request timeouts, and externalizing the API endpoint configuration. Overall, this represents a well-architected secure plugin suitable for deployment with minor enhancements recommended.
Hardcoded API endpoint domain without runtime verification
Evidence:
const apiUrl = `https://api.weather.com/v1/location/${encodeURIComponent(sanitized)}`;API key transmitted in Authorization header without additional validation
Evidence:
'Authorization': `Bearer ${API_KEY}`Rate limiter uses in-memory storage which resets on restart
Evidence:
requests: new Map()No timeout configuration for HTTPS requests
Evidence:
return https.get(apiUrl, { headers: {...} })