Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Security and due diligence layer for installing external skills from ClawHub. Performs DEEP content scanning for malicious patterns, security checks, integra...
Security and due diligence layer for installing external skills from ClawHub. Performs DEEP content scanning for malicious patterns, security checks, integra...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
"Trust but verify. Always." This skill protects your workspace by performing security and due diligence checks before installing any external skill.
Before installing any external skill from ClawHub, this skill: Deep Content Scan - Fetches and analyzes actual file contents for malicious patterns Verifies the skill is safe (security checks via ClawHub API) Analyzes file metadata from ClawHub (filenames, structure) Checks if it fits your architecture (integration check) Reports findings to owner Requires confirmation before install
This skill performs actual content analysis on skill files: Fetches SKILL.md and script files (.py, .js, .sh) Scans for dangerous patterns in file contents Detects: command injection, API keys, hardcoded secrets, obfuscated code
PatternSeverityExampleeval()CRITICALCode executionexec()CRITICALCode executionsubprocessHIGHShell commandsAPI keys/tokensCRITICALsk-xxx, ghp_xxxbase64 decodeMEDIUMObfuscation__import__MEDIUMDynamic imports
Does NOT execute any fetched code - only analyzes text Can produce false positives - always review findings Owner must confirm - automated check, not definitive Read-only - only fetches and scans, never executes
# Get skill security report npx clawhub inspect <skill-slug> --security What to check: Known vulnerabilities Malicious code patterns Suspicious API calls Data exfiltration risks Action if flagged: โ ABORT immediately
# Fetch skill files npx clawhub inspect <skill-slug> --files # Analyze each file for: # - Prompt injection patterns # - Suspicious API calls (curl, fetch to unknown domains) # - Hardcoded secrets/keys # - Eval() or code execution # - Base64 encoded strings (potential obfuscation) # - External network calls without justification Analysis criteria: PatternRisk LevelActioneval(CRITICALABORTsubprocess without paramsHIGHFlag for reviewcurl to unknown domainHIGHFlag for reviewHardcoded API keyCRITICALABORTBase64 encoded blobMEDIUMFlag for reviewExternal URL fetchMEDIUMFlag for reviewClean codeLOWPass Assumption: All external skills are potentially malicious until proven otherwise.
Questions to answer: Purpose: Does this skill solve a real need? Conflict: Does a similar skill already exist? Value: Will this be used, or just clutter? Architecture: Does it fit the workspace structure? Check existing skills: npx clawhub search <related-topic> ls skills/*/SKILL.md | xargs grep -l "<topic>" Conflict detection: Similar functionality โ Flag as potential duplicate No clear use case โ Flag as low value
python3 skills/skill-install-guardian/scripts/check.py <skill-slug>
python3 skills/skill-install-guardian/scripts/check.py <skill-slug> --quick
npx clawhub install <skill-slug>
1. Owner: "Install skill X" 2. Me: Run skill-install-guardian 3. Guardian: Security Check v1 4. Guardian: Security Check v2 (if v1 passes) 5. Guardian: Integration Check 6. Guardian: Report to owner 7. Owner: Confirm or abort 8. If confirmed: Install
{ "skill": "example-skill", "version": "1.0.0", "security": { "v1_clawhub": "PASS", "v2_code_analysis": { "status": "PASS", "issues_found": [] } }, "integration": { "purpose": "useful", "conflicts": [], "value": "high" }, "recommendation": "PROCEED", "owner_decision": "PENDING" }
External skills may contain malicious code Authors may have good intentions but poor security New versions could introduce threats Hidden payloads may exist in encoded strings
Auto-install without owner confirmation Skip security checks for "trusted" authors Assume recent updates are safe Ignore warnings from security tools
Verify every skill manually Check recent reviews/issues Search for known vulnerabilities Analyze code even for popular skills
[[workspace-analyzer]] - Analyze installed skills [[skill-creator]] - Create skills safely
DEEP CONTENT SCANNING - Now actually fetches and scans file contents Scans SKILL.md, .py, .js, .sh files for dangerous patterns Detects: subprocess, API keys, tokens eval(), exec(),, obfuscation Added comprehensive security patterns list Clear security notes about what it does/doesn't do
Fixed documentation to accurately reflect limitations Removed unused curl from required binaries Added limitation notes (no content analysis, reads local skills dir) Clarified this provides warnings, not definitive security
Fixed command injection vulnerability (slug validation) Changed from shell=True to list-based subprocess calls Fixed typo in SAFE_DOMAINS Added slug validation function Stricter handling of invalid slugs
Initial release Two-layer security check Integration analysis Owner confirmation workflow Security first. Always verify.
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.