Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Supply chain security for agent skills. Pre-install inspection, post-install scanning, obfuscation detection, and known-bad signature matching. Verify skills are safe before they touch your workspace. Free alert layer — upgrade to openclaw-sentinel-pro for quarantine, blocking, and community threat feeds.
Supply chain security for agent skills. Pre-install inspection, post-install scanning, obfuscation detection, and known-bad signature matching. Verify skills are safe before they touch your workspace. Free alert layer — upgrade to openclaw-sentinel-pro for quarantine, blocking, and community threat feeds.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Supply chain security scanner for agent skills. Detects obfuscated code, known-bad signatures, suspicious install behaviors, dependency confusion, and metadata inconsistencies — before and after installation.
You install skills from the community. Any skill can contain obfuscated payloads, post-install hooks that execute arbitrary code, or supply chain attacks that modify other skills in your workspace. Existing tools verify file integrity after the fact — nothing inspects skills for supply chain risks before they run.
Deep scan of all installed skills for supply chain risks. Checks file hashes against a local threat database, detects obfuscated code patterns, suspicious install behaviors, dependency confusion, and metadata inconsistencies. Generates a risk score (0-100) per skill. python3 {baseDir}/scripts/sentinel.py scan --workspace /path/to/workspace
python3 {baseDir}/scripts/sentinel.py scan openclaw-warden --workspace /path/to/workspace
Scan a skill directory BEFORE copying it to your workspace. Outputs a SAFE/REVIEW/REJECT recommendation and shows exactly what binaries, network calls, and file operations the skill will perform. python3 {baseDir}/scripts/sentinel.py inspect /path/to/skill-directory
View current threat database statistics. python3 {baseDir}/scripts/sentinel.py threats --workspace /path/to/workspace Import a community-shared threat list. python3 {baseDir}/scripts/sentinel.py threats --update-from threats.json --workspace /path/to/workspace
Summary of installed skills, scan history, and risk score overview. python3 {baseDir}/scripts/sentinel.py status --workspace /path/to/workspace
If --workspace is omitted, the script tries: OPENCLAW_WORKSPACE environment variable Current directory (if AGENTS.md exists) ~/.openclaw/workspace (default)
CategoryPatternsEncoded Executioneval(base64.b64decode(...)), exec(compile(...)), eval/exec with encoded stringsDynamic Imports__import__('os').system(...), dynamic subprocess/ctypes importsShell Injectionsubprocess.Popen with shell=True + string concatenation, os.system()Remote Code Execurllib/requests combined with exec/eval — download-and-run patternsObfuscationLines >1000 chars, high-entropy strings, minified code blocksInstall BehaviorsPost-install hooks, auto-exec in __init__.py, cross-skill file writesHidden FilesNon-standard dotfiles and hidden directoriesDependency ConfusionSkills shadowing popular package names, typosquatting near-matchesMetadata MismatchUndeclared binaries, undeclared env vars, invocable flag inconsistenciesSerializationpickle.loads, marshal.loads — arbitrary code execution via deserializationKnown-Bad HashesFile SHA-256 matches against local threat database
Each skill receives a score from 0-100: ScoreLabelMeaning0CLEANNo issues detected1-19LOWMinor findings, likely benign20-49MODERATEReview recommended50-74HIGHSignificant risk, review required75-100CRITICALSerious supply chain risk
Community-shared threat lists use this JSON format: { "hashes": { "<sha256hex>": {"name": "...", "severity": "...", "description": "..."} }, "patterns": [ {"name": "...", "regex": "...", "severity": "..."} ] }
0 — Clean, no issues 1 — Review needed 2 — Threats detected
Python standard library only. No pip install. No network calls. Everything runs locally.
Works with OpenClaw, Claude Code, Cursor, and any tool using the Agent Skills specification.
Workflow acceleration for inboxes, docs, calendars, planning, and execution loops.
Largest current source with strong distribution and engagement signals.