Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Command-line security analyzer for ClawHub skills. Run analyze-skill.sh to scan SKILL.md files for malicious patterns, credential leaks, and C2 infrastructure before installation. Includes threat intelligence database with 20+ detection patterns.
Command-line security analyzer for ClawHub skills. Run analyze-skill.sh to scan SKILL.md files for malicious patterns, credential leaks, and C2 infrastructure before installation. Includes threat intelligence database with 20+ detection patterns.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
The Skill Security Auditor is a command-line tool that performs pattern-based security analysis of ClawHub skills before installation. Given the recent discovery of 341+ malicious skills (ClawHavoc campaign) that distributed Atomic Stealer (AMOS) and stole cryptocurrency credentials, this tool provides essential pre-installation threat detection. What this skill provides: โ Bash script (analyze-skill.sh) for local security analysis โ Threat intelligence database (patterns/malicious-patterns.json) โ Pattern matching against 20+ known malicious indicators โ Risk scoring system (0-100 scale) โ Detailed audit reports with recommendations How to use it: Install this skill from ClawHub Run the analyze-skill.sh script against any skill (by slug or local file) Review the risk assessment and findings Make informed decision about installation Use this tool when: About to install a new skill from ClawHub Investigating suspicious skill behavior Performing security due diligence on community skills Auditing your currently installed skills This tool does NOT: โ Automatically scan skills (you run it manually) โ Block installations (it's advisory only) โ Access VirusTotal API (use ClawHub's web interface for that) โ Guarantee 100% detection (defense in depth recommended)
Scans for known malicious patterns from the ClawHavoc campaign: Fake prerequisite installations (openclaw-agent.zip, openclaw-setup.exe) Suspicious download commands in SKILL.md Hidden payload execution in metadata Social engineering language patterns Unauthorized external binary downloads
Identifies potential credential exposure vectors: Hardcoded API keys, tokens, passwords in SKILL.md Suspicious environment variable exfiltration Unencrypted sensitive data transmission Overly broad permission requests Credential harvesting patterns
Analyzes skill dependencies for: Unverified binary requirements Suspicious GitHub repository sources External script execution Network connections to unknown hosts Nested dependency exploitation
Checks for Command & Control indicators: Known malicious IP addresses (e.g., 91.92.242.30 from ClawHavoc) Suspicious domain patterns Encoded communication endpoints Data exfiltration channels Beaconing behavior patterns
Verifies skill integrity: Proper YAML frontmatter structure Metadata consistency Description clarity vs actual behavior Permission justification Author verification (GitHub account age)
Each analyzed skill receives a Risk Score (0-100): 0-20: โ SAFE - No significant security concerns 21-40: โ ๏ธ LOW RISK - Minor concerns, proceed with caution 41-60: ๐ก MEDIUM RISK - Multiple red flags, manual review recommended 61-80: ๐ด HIGH RISK - Serious concerns, do NOT install without expert review 81-100: โ ๏ธ CRITICAL - Malicious indicators detected, AVOID installation
This skill provides a bash script (analyze-skill.sh) that performs pattern-based security analysis of ClawHub skills. The analysis runs locally using the included threat intelligence database.
# Install the skill from ClawHub npx clawhub install skill-security-auditor # Make the analyzer executable chmod +x ~/.openclaw/skills/skill-security-auditor/analyze-skill.sh # Optional: Create alias for convenience echo 'alias audit-skill="~/.openclaw/skills/skill-security-auditor/analyze-skill.sh"' >> ~/.bashrc source ~/.bashrc
Method 1: Analyze by slug (automatic fetch from ClawHub) ~/.openclaw/skills/skill-security-auditor/analyze-skill.sh --slug bitcoin-tracker # Example output: # ============================================ # SECURITY AUDIT REPORT # ============================================ # # Risk Score: 85/100 - โ ๏ธ CRITICAL # ... Method 2: Analyze local file # Download skill first curl -s "https://clawhub.ai/api/skills/bitcoin-tracker/latest" > /tmp/skill.md # Then analyze ~/.openclaw/skills/skill-security-auditor/analyze-skill.sh --file /tmp/skill.md
# Scan all skills in your workspace for skill in ~/.openclaw/skills/*/SKILL.md; do echo "Checking: $(basename $(dirname $skill))" ~/.openclaw/skills/skill-security-auditor/analyze-skill.sh -f "$skill" done
# Fast grep-based pattern matching (no full analysis) grep -iE "(prerequisite.*download|91\.92\.242\.30|curl.*\|.*bash)" SKILL.md
Fake Prerequisites Section Matches: "Prerequisites", "Setup Required", "Installation Steps" Contains: Download links to .zip, .exe, .dmg files Example: "Download openclaw-agent.zip from https://..." Known Malicious Infrastructure IP: 91.92.242.30 (ClawHavoc C2) Domains: Newly registered or suspicious TLDs Encoded URLs or base64 obfuscation Credential Harvesting Regex patterns for API keys: (api[_-]?key|token|password)\s*[:=]\s*['\"][^'\"]+['\"] SSH key access requests Wallet private key patterns Unauthorized Code Execution curl | bash or wget | sh patterns Hidden base64 encoded commands Dynamic eval() or exec() on external input
Suspicious Dependencies Binary requirements without clear justification Dependencies from unverified sources Excessive permission requests Obfuscation Techniques Heavily encoded strings in metadata Minified or obfuscated JavaScript/Python Redirect chains in URLs Social Engineering Language Urgency phrases: "Install immediately", "Limited time" Authority claims: "Official OpenClaw", "Verified by Anthropic" Fear tactics: "Your system is at risk without this"
Verified Author GitHub account > 1 year old Multiple well-rated skills Active community engagement Transparent Dependencies Clear binary requirements with official sources Open-source tool dependencies Well-documented permission needs Code Quality Clean, readable SKILL.md Proper error handling No unnecessary network calls
Important: This skill does NOT directly access VirusTotal's API. Instead, VirusTotal integration is available through ClawHub's web interface via their partnership with VirusTotal. To check VirusTotal results for a skill: Visit the skill's ClawHub page: https://clawhub.ai/skills/{skill-slug} Look for the VirusTotal scan results on the skill's page ClawHub automatically scans published skills via their VirusTotal partnership This analyzer focuses on pattern-based threat detection. It complements (but does not replace) ClawHub's VirusTotal scanning.
Run this analyzer first - Pattern-based detection (local, instant) Check ClawHub's VirusTotal results - Binary/file reputation (if available) Manual code review - Final verification for critical use cases # Step 1: Pattern analysis (local) ~/.openclaw/skills/skill-security-auditor/analyze-skill.sh -s suspicious-skill # Step 2: Visit ClawHub page for VirusTotal results # https://clawhub.ai/skills/suspicious-skill # Step 3: Manual review if needed curl -s "https://clawhub.ai/api/skills/suspicious-skill/latest" > skill.md less skill.md
Scenario: User wants to install a skill called solana-wallet-tracker Step 1: Run Security Analysis $ ~/.openclaw/skills/skill-security-auditor/analyze-skill.sh -s solana-wallet-tracker Fetching skill 'solana-wallet-tracker' from ClawHub... โ Skill fetched successfully Analyzing skill content... ============================================ SECURITY AUDIT REPORT ============================================ Risk Score: 95/100 - โ ๏ธ CRITICAL ============================================ โ ๏ธ CRITICAL FINDINGS: CLAW-001: Fake Prerequisites - ClawHavoc Campaign [+50 points] โโ Matches the ClawHavoc campaign pattern of fake prerequisites requesting malicious binary downloads CLAW-002: Known C2 Infrastructure [+50 points] โโ IP address used in ClawHavoc campaign for C2 communications ============================================ RECOMMENDATION: DO NOT INSTALL. Malicious patterns detected matching known attack campaigns. ============================================ Step 2: Decision โ ๏ธ CRITICAL Risk โ DO NOT INSTALL Report skill to ClawHub moderators Look for safe alternatives Step 3: Verify on ClawHub (optional) # Visit skill page to check VirusTotal results open "https://clawhub.ai/skills/solana-wallet-tracker"
Sandbox execution monitoring Network traffic analysis File system access patterns
Share malicious skill signatures Collaborative IOC database Reputation scoring system
Auto-audit skills on updates Alert on new security advisories Periodic re-scanning of installed skills
To minimize false positives: Contextual Analysis: Binary requirements for legitimate tools (e.g., gh for GitHub CLI) are validated against known safe sources Whitelisting: Verified authors and established skills get trust bonuses Human Review Option: Always provide detailed reasoning for security decisions Appeal Process: Users can report false positives for skill reputation adjustment
This skill: โ Analyzes publicly available skill metadata โ Protects user security and privacy โ Promotes responsible skill development โ Does NOT perform unauthorized access โ Does NOT guarantee 100% security (nothing does) โ Does NOT replace user judgment
๐ด Security Alert: HIGH RISK DETECTED {skill-name} has been flagged with CRITICAL security concerns. Risk Score: {score}/100 (HIGH) โ ๏ธ Critical Findings: {detailed findings} This skill matches patterns from the ClawHavoc malware campaign. Recommendation: DO NOT INSTALL. Consider reporting this skill to ClawHub moderators. Alternative safe skills: {suggestions}
Pattern Database Location: ~/.openclaw/security-auditor/patterns/ malicious-patterns.json: Known bad indicators safe-patterns.json: Whitelisted elements ioc-database.json: Indicators of Compromise Update Mechanism: # Pull latest threat intelligence curl -s "https://openclaw-security.github.io/threat-intel/latest.json" \ > ~/.openclaw/security-auditor/patterns/ioc-database.json
Found a new malicious pattern? Submit IOCs to the OpenClaw Security Working Group: GitHub: github.com/openclaw/security-auditor Report Format: JSON with pattern regex, description, severity
โ ๏ธ Important Disclaimers: This tool provides analysis, not guarantees Sophisticated malware may evade detection Always combine with VirusTotal + manual review for critical applications Security is a shared responsibility No automated tool replaces security expertise
ClawHavoc Campaign Analysis: [The Hacker News, Feb 2026] OpenClaw Security Partnership: VirusTotal Integration Malicious Skill Database: OpenSourceMalware Research ClawHub Moderation Guide: docs.openclaw.ai/security Remember: The best security is defense in depth. Use this skill as ONE layer of your security strategy, not the only layer. Stay safe, stay skeptical, stay secure. ๐ฆ๐ก๏ธ
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.