NC-AUTH-002

No API tokens in workspace files

๐ŸŸ  High โš—๏ธ Experimental โš—๏ธ Experimental โ€” not scored

What this checks

Scans workspace files for exposed API tokens and credentials.

Why it matters

API tokens in workspace files can be accidentally committed to version control or accessed by unauthorized users.

How to fix it

Move API tokens to environment variables or a secrets manager. See: https://clawvitals.io/docs/NC-AUTH-002

Technical details

FieldValue
Control IDNC-AUTH-002
DomainAUTH
SeverityHigh
StatusExperimental
Data sourceworkspace_scan
Source typederived
ModeMode 1 (OpenClaw native)
Introduced inLibrary v0.1.0
OWASP LLM 2025LLM02: Sensitive Information Disclosure

False positive notes

May match non-token strings that look like tokens. Higher false-positive risk than authoritative checks.

Suppress this finding

If this finding is intentional or not applicable to your setup, you can exclude it:

clawvitals exclude NC-AUTH-002 reason "your reason here"

Exclusions are auditable and expire automatically. See the exclusions guide.