Vauxr Openclaw
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The plugin's code, runtime instructions, and configuration requests are consistent with a Vauxr <-> OpenClaw channel bridge; nothing requested appears disproportionate to that purpose.
This plugin implements a straightforward Vauxr ↔ OpenClaw bridge and the runtime/API calls align with that purpose. Before installing: 1) Only configure the plugin with a Vauxr URL and token you trust (ideally on a local network); 2) Be cautious about enabling the plugins.allowPromptInjection/allowPromptInjection hook — doing so intentionally appends a system prompt to voice sessions and can change how the agent behaves; enable it only if you trust device sources and prompts; 3) If your environment will run npm install/npm ci for the package, review package-lock.json/dependencies (it contains many transitive packages) or perform a dependency audit before installing in a sensitive environment; 4) Consider running the plugin in a segmented network or test environment first to confirm behavior (connection, tool actions) and to ensure Vauxr-TTS/STT flows are as expected.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
No VirusTotal findings
Risk analysis
No visible risk-analysis findings were reported for this release.
