Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Security audit and quarantine system for third-party OpenClaw skills. Use when evaluating, reviewing, or installing any skill from ClawHub or external source...
Security audit and quarantine system for third-party OpenClaw skills. Use when evaluating, reviewing, or installing any skill from ClawHub or external source...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Security gatekeeper for third-party skill installation. No skill gets installed without passing audit.
Before installing ANY skill from ClawHub or external sources When asked to review/evaluate a skill's safety When clawhub install or similar installation is requested
Never copy a skill directly to the production skills directory. Always quarantine first: bash skills/skill-auditor/scripts/quarantine.sh /path/to/skill-source This copies the skill to a temp directory, runs the full audit, and only allows installation if the risk score is CLEAN or LOW.
For inspection without the quarantine wrapper: python3 skills/skill-auditor/scripts/audit_skill.py /path/to/skill-dir Outputs JSON report to stdout. Add --human for formatted text output.
RatingActionCLEANSafe to installLOWSafe, minor notes โ review findings brieflyMEDIUMDo NOT install without manual review of each findingHIGHBlock installation โ likely malicious patterns detectedCRITICALBlock immediately โ active threat indicators (exfil, prompt injection, obfuscated payloads)
0 = CLEAN or LOW (safe) 1 = MEDIUM (needs review) 2 = HIGH or CRITICAL (blocked)
All files: inventory, sizes, suspicious file types Code: shell commands, network calls, env access, filesystem escape, obfuscation, dynamic imports SKILL.md: prompt injection patterns, permission scope requests Dependencies: requirements.txt / package.json flagged packages Encoding: base64 payloads, hex/unicode escapes, string manipulation tricks
references/known-patterns.md โ catalog of real attack patterns from ClawHub references/prompt-injection-patterns.md โ prompt injection signatures to detect
If a skill scores MEDIUM or above, always show Abidi the full findings before taking any action. Never override or bypass the auditor. This is the last line of defense before untrusted code enters the system.
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.