โ† All skills
Tencent SkillHub ยท Developer Tools

Skill Sandbox

Test untrusted skills in an isolated environment before installing. Monitors network access, filesystem writes, environment variable reads, and subprocess ca...

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Test untrusted skills in an isolated environment before installing. Monitors network access, filesystem writes, environment variable reads, and subprocess ca...

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
SKILL.md, scripts/sandbox.py

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.1.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 16 sections Open source page

Skill Sandbox

Run untrusted skills in a monitored environment. See exactly what they do before giving them access to your real system.

Why This Exists

ClawHub has hundreds of skills. Some are malicious. Even after scanning with arc-skill-scanner, you can't catch everything with static analysis. The sandbox lets you run a skill's scripts and observe their behavior at runtime โ€” what network calls they make, what files they access, what environment variables they read.

Sandbox a skill directory

python3 {baseDir}/scripts/sandbox.py run --path ~/.openclaw/skills/some-skill/

Run a specific script in sandbox

python3 {baseDir}/scripts/sandbox.py run --script ~/.openclaw/skills/some-skill/scripts/main.py

Run with network monitoring

python3 {baseDir}/scripts/sandbox.py run --path ~/.openclaw/skills/some-skill/ --monitor-network

Run with fake environment variables

python3 {baseDir}/scripts/sandbox.py run --path ~/.openclaw/skills/some-skill/ --fake-env

Run with a time limit

python3 {baseDir}/scripts/sandbox.py run --path ~/.openclaw/skills/some-skill/ --timeout 30

Generate a safety report

python3 {baseDir}/scripts/sandbox.py report --path ~/.openclaw/skills/some-skill/

Filesystem Access

Files opened (read/write) Directories created File deletions Permission changes

Environment Variables

Which env vars are read Whether sensitive keys are accessed (API keys, tokens, passwords) Option to inject fake values to see what the skill does with them

Network Activity

Outbound HTTP/HTTPS requests (URLs, methods, payloads) DNS lookups Socket connections FTP, SMTP, and other protocols

Process Execution

Subprocess calls Shell commands Dynamic imports

Safety Modes

observe (default) โ€” Run the skill and log everything it does. No restrictions. restricted โ€” Block network access and filesystem writes outside a temp directory. honeypot โ€” Provide fake credentials and endpoints to see if the skill tries to exfiltrate.

Output

The sandbox produces a JSON report with: All filesystem operations (reads, writes, deletes) All environment variable accesses All network connections attempted All subprocess calls Warnings for suspicious patterns A safety verdict (SAFE / SUSPICIOUS / DANGEROUS)

Integration

Combine with the workflow orchestrator for automated pre-install checks: scan skill โ†’ sandbox run โ†’ review report โ†’ install if safe โ†’ audit log

Limitations

Python skills only (JavaScript/shell support planned) Cannot catch all evasion techniques (obfuscated or delayed execution) Network monitoring requires the skill to use standard Python libraries Not a true OS-level sandbox (use Docker for that level of isolation)

Category context

Code helpers, APIs, CLIs, browser automation, testing, and developer operations.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
1 Docs1 Scripts
  • SKILL.md Primary doc
  • scripts/sandbox.py Scripts