Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Security scanner for OpenClaw skills. Scans skills for malware, credential theft, data exfiltration, prompt injection, and permission overreach before instal...
Security scanner for OpenClaw skills. Scans skills for malware, credential theft, data exfiltration, prompt injection, and permission overreach before instal...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Scans OpenClaw skills for security threats before installation. Catches agent-specific attacks that generic antivirus misses.
# Scan a skill directory python3 scripts/skillguard.py scan ~/.openclaw/workspace/skills/<skill-name> # Scan with JSON output python3 scripts/skillguard.py scan ~/.openclaw/workspace/skills/<skill-name> --json # Scan all installed skills python3 scripts/skillguard.py scan-all # Quick summary of all skills python3 scripts/skillguard.py audit
Credential Access โ reads of config files, env vars, wallet files, API keys Network Exfiltration โ outbound HTTP calls, encoded payloads, suspicious domains File System Abuse โ path traversal, writes outside skill directory, hidden files Prompt Injection โ SKILL.md content that manipulates agent behavior Dependency Risks โ suspicious npm post-install scripts, known bad packages Obfuscation โ extremely long lines, hex/unicode escape sequences Symlink Attacks โ symlinks escaping the skill directory to access sensitive files Config File Secrets โ hardcoded credentials in .json, .env, .yaml files
Each scan produces: Risk Score: 0-100 (0 = clean, 100 = critical threat) Verdict: PASS / WARN / FAIL Findings: Detailed list of issues with severity and evidence
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.