โ† All skills
Tencent SkillHub ยท Security & Compliance

Security Checker

Security scanner for Python skills before publishing to ClawHub. Use before publishing any skill to check for dangerous imports, hardcoded secrets, unsafe file operations, and dangerous functions like eval/exec/subprocess. Essential for maintaining trust and ensuring published skills are safe for others to install and run.

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Security scanner for Python skills before publishing to ClawHub. Use before publishing any skill to check for dangerous imports, hardcoded secrets, unsafe file operations, and dangerous functions like eval/exec/subprocess. Essential for maintaining trust and ensuring published skills are safe for others to install and run.

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
SKILL.md, scripts/security_scan.py

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.0.1

Documentation

ClawHub primary doc Primary doc: SKILL.md 19 sections Open source page

Security Checker

Security scan Python skills before publishing to ensure code safety.

Quick Start

security_scan.py <file_or_directory> Examples: # Scan a single Python file security_scan.py scripts/my_script.py # Scan an entire skill directory security_scan.py /path/to/skill-folder # Scan multiple skills security_scan.py skills/

Dangerous Imports

Detects imports that could be used maliciously: os - System-level operations subprocess - Command execution shutil - File operations socket - Network operations urllib / requests - HTTP requests Why dangerous? These imports enable system command execution, file manipulation, and network access that could be exploited.

Dangerous Functions

Detects potentially unsafe function calls: os.system() - Executes shell commands subprocess.call(), subprocess.run(), subprocess.Popen() - Command execution eval() - Executes arbitrary code exec() - Executes arbitrary code Why dangerous? These can execute arbitrary commands or code, leading to remote code execution vulnerabilities.

Hardcoded Secrets

Detects tokens, keys, and passwords: API keys Auth tokens (including ClawHub tokens) Passwords Private keys JWT-like tokens Why dangerous? Secrets leaked in published code can be stolen and abused.

Unsafe File Operations

Detects risky file access patterns: Absolute file paths outside expected directories Parent directory traversal (..) Writing to system directories Why dangerous? Could lead to unintended file access, data loss, or system modification.

Usage Pattern: Pre-Publish Checklist

Before publishing any skill: # 1. Run security scan security_scan.py /path/to/skill # 2. Review any warnings # If warnings appear, fix the code or document why it's safe # 3. Re-scan after fixes security_scan.py /path/to/skill # 4. Only publish if scan passes clawhub publish /path/to/skill --slug my-skill ...

โœ… "No security issues found"

Code appears safe. Proceed with publishing.

โš ๏ธ "Warning" (Yellow)

Potentially risky pattern detected. Review the specific line and decide: Is it legitimate? Document why in code comments or SKILL.md Can it be avoided? Refactor to safer alternatives Is it necessary? Clearly document the risk and purpose

๐Ÿ”ด "Possible hardcoded secret"

Secret detected. Before publishing: Remove the secret Use environment variables instead: os.getenv('API_KEY') Document required env variables in SKILL.md Never commit real secrets

Legitimate os module usage (documented)

import os # Used only for path.join() - safe file path construction workspace = os.path.join(os.path.expanduser("~"), ".openclaw", "workspace") Scan result: โš ๏ธ Warning about os import Action: Document safe usage pattern in code comments

Hardcoded secret (must fix)

API_KEY = "sk-1234567890abcdef" # DON'T DO THIS Scan result: ๐Ÿ”ด Possible hardcoded secret Action: Remove and use environment variable: API_KEY = os.getenv("MY_SKILL_API_KEY") # Document in SKILL.md: Requires MY_SKILL_API_KEY environment variable

Safe pattern (no issues)

# JSON storage for local data only data = {"notes": [], "metadata": {}} with open("data.json", "w") as f: json.dump(data, f) Scan result: โœ… No issues

Best Practices

Always scan before publishing - Make it part of your workflow Review warnings manually - The scanner can't judge context Use environment variables for secrets - Never hardcode Prefer json over eval - Safe parsing vs code execution Document necessary risks - If dangerous code is required, explain why Minimize dangerous imports - Only use what's truly necessary Keep code simple - Complex code is harder to audit

Before committing to repo

# Pre-commit hook concept python3 /path/to/security_scan.py scripts/ if [ $? -ne 0 ]; then echo "โŒ Security scan failed. Fix issues before committing." exit 1 fi

Automated pre-publish check

#!/bin/bash # publish-safe.sh SKILL_PATH=$1 echo "๐Ÿ”’ Running security scan..." python3 /path/to/security_scan.py "$SKILL_PATH" if [ $? -ne 0 ]; then echo "โŒ Cannot publish: Security scan failed" exit 1 fi echo "โœ… Security scan passed" clawhub publish "$SKILL_PATH"

Limitations

This scanner: Can't judge context - Some dangerous code may be legitimate Static analysis only - Doesn't execute code Python-focused - Other languages need different tools Basic patterns - Sophisticated obfuscation may evade detection Complement with: Manual code review Testing in isolated environment Reading through all code before publishing Using additional tools: bandit, safety

Trust Building

Publishing skills that pass security scans builds trust in the community: Users know you care about safety Your reputation improves Skills get adopted more readily ClawHub may highlight safe skills

Examples of Published Skills (All Scanned)

# research-assistant security_scan.py /home/ubuntu/.openclaw/workspace/skills/research-assistant # โœ… All clear # task-runner security_scan.py /home/ubuntu/.openclaw/workspace/skills/task-runner # โœ… All clear # security-checker security_scan.py /home/ubuntu/.openclaw/workspace/skills/security-checker # โœ… All clear All three skills passed security scans before publishing to ClawHub.

Category context

Identity, auth, scanning, governance, audit, and operational guardrails.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
1 Docs1 Scripts
  • SKILL.md Primary doc
  • scripts/security_scan.py Scripts