Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Security audit tool for OpenClaw skills. Scans for credential harvesting, code injection, network exfiltration, obfuscation. ALWAYS run before installing any...
Security audit tool for OpenClaw skills. Scans for credential harvesting, code injection, network exfiltration, obfuscation. ALWAYS run before installing any...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Security audit tool for OpenClaw skills. Run before installing any new skill.
# Audit a skill directory ~/workspace/skills/skill-security/audit.sh /path/to/skill # Audit all installed skills ~/workspace/skills/skill-security/audit-all.sh
CheckRisk LevelPatternNetwork Exfiltration🚨 HIGHrequests., urllib, http.client, socket., fetch(, axiosCredential Harvesting🚨 HIGH.ssh/, .aws/, pass , keyring, credential, secret, token file readsCode Injection🚨 CRITICALexec(, eval(, compile(, Function(, __import__Obfuscation⚠️ MEDIUMbase64.decode, atob, encoded payloadsEnv Dumping⚠️ MEDIUMos.environ, process.env, getenv bulk accessSubprocess Abuse⚠️ MEDIUMsubprocess.run, os.system, child_process with credentials
CRITICAL (🚨): Block installation, report to owner HIGH (🔴): Requires manual review before use MEDIUM (🟡): Note but allow if from trusted source LOW (🟢): Informational only
Before using any skill: ✅ Is it from a trusted source? (official OpenClaw, known publisher) ✅ Is the code readable (not obfuscated)? ✅ Does it document why it needs network/credential access? ✅ Does it scope file access to its own directory? ✅ Has it been audited by the community?
Add this to your workflow: ## Skill Installation Protocol Before loading any new skill: 1. Run `~/workspace/skills/skill-security/audit.sh <skill-path>` 2. If CRITICAL/HIGH findings → STOP, alert the user 3. If MEDIUM findings → Review manually, proceed if justified 4. If CLEAN → Safe to use
The scanner creates a blocklist at ./blocklist.txt. Skills with CRITICAL findings are automatically added.
If a skill is flagged but you've verified it's safe: echo "skill-name:verified:YYYY-MM-DD:reason" >> allowlist.txt
Like this? Check out our premium skills at skillpacks.dev: 🛡️ Security Suite — Full PII scanning, secrets detection, prompt injection defense — $9.90 🧠 Structured Memory — Three-tier memory replacing flat MEMORY.md — $9.90 📋 Planning & Execution — Systematic task plans with batch execution — $9.90 💎 Bundle — all 3 for $24.90
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.