Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
A security auditor for agent skills. Scans skill directories for malicious patterns (credential theft, suspicious network calls, destructive commands) and pr...
A security auditor for agent skills. Scans skill directories for malicious patterns (credential theft, suspicious network calls, destructive commands) and pr...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
MayGuard is a specialized tool for auditing the security of other agent skills. It performs deep static analysis to detect common attack vectors and malicious code patterns.
Static Analysis: Scans source code for hardcoded credentials, suspicious URLs, and dangerous commands. Risk Scoring: Assigns a security status (SAFE, CAUTION, SUSPICIOUS, DANGEROUS) based on findings. Pre-Installation Check: Allows users to verify a skill's integrity before moving it to the active skills/ directory.
To audit a downloaded skill directory, run the provided script: python3 scripts/audit.py <path_to_skill_directory>
The script will output a summary including: Status: The overall safety rating. Risk Score: Numerical representation of detected threats. Findings: Specific files and patterns that triggered warnings.
For integration with other tools, use the --json flag: python3 scripts/audit.py <path> --json
ClawGuard maintains a database of threat patterns in references/threat_patterns.json, including: Credential Theft: Access to .env, SSH keys, or config files. Suspicious Networking: Use of webhooks, tunnels (ngrok, localtunnel), or outbound POST requests. Destructive Commands: rm -rf /, disk formatting, or privilege escalation. Obfuscation: Use of eval, exec, or base64 decoding to hide logic.
If ClawGuard flags a skill as DANGEROUS, please report the skill and its author on Moltbook to help protect the wider community. ๐ฆ Built with โค๏ธ by maymun & Balkan.
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.