โ† All skills
Tencent SkillHub ยท Security & Compliance

Skill Scan

Security scanner for OpenClaw skill packages. Scans skills for malicious code, evasion techniques, prompt injection, and misaligned behavior BEFORE installation. Use to audit any skill from ClawHub or local directories.

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Security scanner for OpenClaw skill packages. Scans skills for malicious code, evasion techniques, prompt injection, and misaligned behavior BEFORE installation. Use to audit any skill from ClawHub or local directories.

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
CHANGELOG.md, pyproject.toml, TESTING.md, README.md, SKILL.md, rules/dangerous-patterns.json

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.0.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 17 sections Open source page

Skill-Scan โ€” Security Auditor for Agent Skills

Multi-layered security scanner for OpenClaw skill packages. Detects malicious code, evasion techniques, prompt injection, and misaligned behavior through static analysis and optional LLM-powered deep inspection. Run this BEFORE installing or enabling any untrusted skill.

Features

6 analysis layers โ€” pattern matching, AST/evasion, prompt injection, LLM deep analysis, alignment verification, meta-analysis 60+ detection rules โ€” execution threats, credential theft, data exfiltration, obfuscation, behavioral signatures Context-aware scoring โ€” reduces false positives for legitimate API skills ClawHub integration โ€” scan skills directly from the registry by slug Multiple output modes โ€” text report (default), --json, --compact, --quiet Exit codes โ€” 0 for safe, 1 for risky (easy scripting integration)

When to Use

MANDATORY before installing or enabling: Skills from ClawHub (any skill not authored by you) Skills shared by other users or teams Skills from public repositories Any skill package you haven't personally reviewed RECOMMENDED for periodic audits of already-installed skills.

Quick Start

# Scan a local skill directory skill-scan scan /path/to/skill # Scan a skill from ClawHub before installing it skill-scan scan-hub some-skill-slug # Batch scan all installed skills skill-scan batch /path/to/skills-directory # JSON output for programmatic use skill-scan scan-hub some-skill-slug --json # Quiet mode (just score + verdict) skill-scan scan-hub some-skill-slug --quiet

Risk Scoring

RiskScoreActionLOW80-100Safe to installMEDIUM50-79Review findings before installingHIGH20-49Do NOT install โ€” serious threats detectedCRITICAL0-19Do NOT install โ€” multiple critical threats

Exit Codes

0 โ€” LOW risk (safe to proceed) 1 โ€” MEDIUM or higher (block installation)

LLM Options

skill-scan scan-hub slug --llm # Always run deep analysis (layers 4-5) skill-scan scan-hub slug --llm-auto # LLM only if pattern scan finds MEDIUM+ skill-scan scan-hub slug --llm-only # Skip patterns, LLM analysis only Provider auto-detected from environment: OPENAI_API_KEY -> gpt-4o-mini ANTHROPIC_API_KEY -> claude-sonnet-4-5

For the Agent

When the user asks to install a skill from ClawHub, follow this workflow: Scan first โ€” run skill-scan scan-hub <slug> BEFORE installing Check the result: If LOW risk (exit code 0): proceed with installation If MEDIUM risk: show findings to the user and ask whether to proceed If HIGH or CRITICAL risk: block installation and show the report Report โ€” always show the user the scan summary (score, risk level, finding count)

Alert Format

When a scan finds MEDIUM or higher risk: ๐Ÿ›ก๏ธ Skill-Scan Alert: {RISK_LEVEL} ({SCORE}/100) Skill: {slug} Findings: {count} issue(s) detected Top threat: {highest severity finding title} Action: Installation blocked pending review.

AGENTS.md Integration

To integrate skill-scan into your agent's workflow, add ONE of the following templates to your AGENTS.md (or equivalent agent instructions file).

Option A: Automatic Scanning (Recommended)

All ClawHub skill installs are automatically scanned before installation. No manual step needed. ## Skill-Scan โ€” Automatic Pre-Install Security Scanning BEFORE installing any skill from ClawHub, you MUST scan it with skill-scan first. This is non-negotiable โ€” never skip the scan. ### Workflow 1. When the user asks to install a skill (e.g. `clawhub install <slug>`), run the scan FIRST: ```bash skill-scan scan-hub <slug> Check the exit code and output: Exit code 0 (LOW risk) โ€” proceed with clawhub install <slug> Exit code 1 (MEDIUM risk) โ€” show findings to the user, ask whether to proceed Exit code 1 (HIGH/CRITICAL risk) โ€” BLOCK installation, show the full report Never install a HIGH or CRITICAL risk skill without explicit user override Always show the scan summary to the user before proceeding with installation

Periodic Audits

When asked to audit installed skills, batch scan the skills directory: skill-scan batch {skillsDir}

LLM Deep Analysis

  • For high-stakes installs or when pattern scan returns MEDIUM, escalate to LLM analysis:
  • skill-scan scan-hub <slug> --llm-auto
  • ### Option B: Manual On-Demand Scanning
  • Skills are only scanned when the user explicitly asks. Installation proceeds without automatic checks.
  • ```markdown
  • ## Skill-Scan โ€” On-Demand Skill Security Scanning
  • skill-scan is available to audit skill packages for security threats. Use it when the user requests a security scan.
  • ### Commands
  • **Scan a ClawHub skill**: `skill-scan scan-hub <slug>`
  • **Scan a local skill**: `skill-scan scan /path/to/skill`
  • **Batch scan installed skills**: `skill-scan batch {skillsDir}`
  • **Deep analysis with LLM**: add `--llm` or `--llm-auto` to any scan command
  • ### Risk Levels
  • **LOW (80-100)** โ€” safe, no significant threats
  • **MEDIUM (50-79)** โ€” review findings, use caution
  • **HIGH (20-49)** โ€” serious threats, do not install
  • **CRITICAL (0-19)** โ€” multiple critical threats, do not install
  • ### When the User Asks to Scan
  • 1. Run the appropriate scan command
  • 2. Show the scan summary (score, risk level, finding count)
  • 3. If MEDIUM+, list the top findings with severity and description
  • 4. Let the user decide what to do

Install-Time Setup

When this skill is first installed, ask the user: How should skill-scan integrate with your workflow? Automatic (Recommended) โ€” Every clawhub install is scanned first. HIGH/CRITICAL installs are blocked automatically. Manual โ€” Scanning only happens when you explicitly ask for it. Based on their choice, add the corresponding template (Option A or Option B above) to the project's AGENTS.md.

Detection Categories

Execution threats โ€” eval(), exec(), child_process, dynamic imports Credential theft โ€” .env access, API keys, tokens, private keys, wallet files Data exfiltration โ€” fetch(), axios, requests, sockets, webhooks Filesystem manipulation โ€” Write/delete/rename operations Obfuscation โ€” Base64, hex, unicode encoding, string construction Prompt injection โ€” Jailbreaks, invisible characters, homoglyphs, roleplay framing, encoded instructions Behavioral signatures โ€” Compound patterns: data exfiltration, trojan skills, evasive malware, persistent backdoors

Requirements

Python 3.10+ httpx>=0.27 (for LLM API calls only) API key only needed for --llm modes (static analysis is self-contained)

Related Skills

input-guard โ€” External input scanning memory-scan โ€” Agent memory security guardrails โ€” Security policy configuration

Category context

Identity, auth, scanning, governance, audit, and operational guardrails.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
4 Docs1 Config1 Files
  • SKILL.md Primary doc
  • CHANGELOG.md Docs
  • README.md Docs
  • TESTING.md Docs
  • rules/dangerous-patterns.json Config
  • pyproject.toml Files