Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Security scanner for OpenClaw/ClawHub skills. Detects malware, reverse shells, credential theft, prompt injection, memory poisoning, typosquatting, and suspicious prerequisites before installation. Use when installing new skills, auditing existing skills, checking a skill name for typosquatting, or scanning ClawHub skills for security risks.
Security scanner for OpenClaw/ClawHub skills. Detects malware, reverse shells, credential theft, prompt injection, memory poisoning, typosquatting, and suspicious prerequisites before installation. Use when installing new skills, auditing existing skills, checking a skill name for typosquatting, or scanning ClawHub skills for security risks.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Scan OpenClaw skills for security threats before they compromise your system.
python3 {scripts}/scanner.py
python3 {scripts}/scanner.py --skill <skill-name>
python3 {scripts}/scanner.py --check-name <name>
python3 {scripts}/scanner.py --fetch-clawhub <skill-name>
Reverse shells โ nc -e, bash -i >& /dev/tcp, ncat, mkfifo Code obfuscation โ base64 -d | bash, eval(), exec() with encoded payloads
Suspicious URLs โ webhook.site, glot.io, ngrok.io, pastebin.com Memory poisoning โ Instructions to write to SOUL.md, MEMORY.md, AGENTS.md Malicious prerequisites โ Download instructions in docs (the ClawHavoc attack vector)
Credential access โ Patterns accessing .env, API keys, tokens, SSH keys Data exfiltration โ Outbound HTTP POST/PUT with sensitive data Hardcoded IPs โ Public IPs embedded in code Typosquatting โ Skill names similar to popular/known skills (Levenshtein โค 2) Crypto wallet access โ Seed phrases, private keys, wallet patterns
Shell execution โ subprocess, os.system, child_process (common but worth noting)
๐ด CRITICAL (โฅ50) โ Do NOT install. Likely malicious. ๐ HIGH (25-49) โ Review manually before installing. Multiple suspicious patterns. ๐ก MEDIUM (10-24) โ Some flags, likely false positives but worth checking. ๐ข LOW (1-9) โ Minor flags, generally safe. โ CLEAN (0) โ No issues detected.
Each finding includes a FP estimate (low/medium/high): low โ Likely a real threat medium โ Could be legitimate, review context high โ Probably benign (e.g., security tool referencing attack patterns, search tool using fetch)
Run python3 {scripts}/scanner.py --fetch-clawhub <skill-name> (requires clawhub CLI) Review the report โ anything CRITICAL or HIGH with low FP = reject If CLEAN or LOW only โ safe to install If MEDIUM โ skim the flagged files manually
Console summary with emoji risk levels JSON report saved to {baseDir}/../data/scan_results.json (configurable via --json-out)
As of February 2026, 341 malicious skills were found on ClawHub (Koi Security / ClawHavoc campaign), distributing Atomic Stealer malware via fake prerequisites. OpenClaw has 512 known vulnerabilities (Kaspersky audit). There is no official skill vetting process. SkillGuard fills this gap. See references/threat-landscape.md for detailed background.
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.