Sx Security Audit 1.0.0
全方位安全审计技能。检查文件权限、环境变量、依赖漏洞、配置文件、网络端口、Git 安全、Shell 安全、macOS 安全、密钥检测等。支持 CLI 参数、JSON 输出、配置文件。当用户要求"安全检查"、"漏洞扫描"、"权限检查"、"安全审计"时使用此技能。
MIT-0 · Free to use, modify, and redistribute. No attribution required.
⭐ 0 · 56 · 1 current installs · 1 all-time installs
MIT-0
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name/description (全方位安全审计) matches the code and SKILL.md: the scripts implement permission checks, secret detection, dependency checks, git/history scanning, port listing, macOS checks, and report generation/sending. There are no unexpected cloud credentials or unrelated external service credentials required by default.
Instruction Scope
The runtime instructions and scripts explicitly read many local files and state (home dir, ~/.openclaw/openclaw.json, workspace, shell histories, git commits, process environment, node/npm audit output, lsof output). This is coherent for an audit tool, but the scope is broad — it will scan and potentially include sensitive secrets from configs and environment variables in generated reports.
Install Mechanism
No install spec — instruction-only plus included Python scripts. No remote downloads or package installs are forced by the skill. SKILL.md notes that external tools (npm, lsof) may be required at runtime, which is appropriate for the checks performed.
Credentials
The skill does not declare or require any environment credentials, but it scans the process environment and OpenClaw configuration for sensitive keys and supports FEISHU_WEBHOOK_URL / plugin API endpoints for report delivery. Requesting no env vars is proportionate; however scan + automatic send could expose secrets if misused or if an outgoing webhook/plugin endpoint is configured.
Persistence & Privilege
always:false and default autonomous invocation are used. The skill reads local config and workspace but does not request permanent platform-wide privileges or modify other skills. Some checks may require sudo (noted in SKILL.md) which is appropriate for full port scans; no evidence the skill persistently alters system or other skills.
Assessment
This skill appears to be what it says: a local security audit that scans files, env vars, git history, dependencies, and can send formatted reports to Feishu. Before installing or running it:
- Review ~/.openclaw/openclaw.json for any plugin apiEndpoint or webhook settings the script could use to send data; if you don't want report upload, don't configure a webhook or OpenClaw Feishu plugin.
- Run audits in a controlled environment (or set excludePaths in .security-audit.json) so the tool doesn't read directories you consider too sensitive (e.g., backup directories, vaults).
- Expect the tool to include detected secrets in reports; if you will send reports to external endpoints, rotate any secrets accidentally disclosed.
- If you plan automated runs, prefer --json --output report.json and inspect the report offline before sending it to any webhook.
- Check for required system utilities (npm, lsof) and run without root unless you intentionally need privileged checks.
Confidence is medium because some portions of scripts were truncated; if you want higher confidence, provide the full security_audit.py and send_report_to_feishu.py contents so I can verify there are no hidden network endpoints, no unexpected exec calls that perform exfiltration, and exactly how subprocess/network operations are invoked.scripts/security_audit.py:408
Dynamic code execution detected.
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
Current versionv1.0.0
Download ziplatest
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
SKILL.md
Security Audit - 全方位安全审计技能
本技能提供全面的安全检查功能,涵盖系统、代码、配置等多个层面,并支持生成报告发送到飞书。
检查范围
本技能支持以下安全检查模块(可通过 --check 选择):
🔒 permissions - 权限与访问控制
- 敏感文件权限 - 检查 .ssh、.aws、.gnupg、OpenClaw 目录权限
- 使用位掩码
actual_mode & ~expected_mode精确检测超出预期的权限位
🔓 world_writable - 世界可写文件检测
- 在 workspace 目录下扫描 o+w 权限的文件
- 检测 SUID/SGID 位设置的文件
🔐 config - OpenClaw 配置安全
- 使用正则模式检测配置文件中的真实密钥(AWS、GitHub、Slack、OpenAI 等)
- 检查 Gateway 认证方式
- 检查插件安装状态
📝 skills - Skills 代码安全
- 用正则模式匹配检测硬编码密钥
- 检查不安全的函数调用(eval、exec、os.system 等)
- 高熵字符串检测(Shannon entropy > 4.5)
📦 dependencies - 依赖与供应链安全
- 运行
npm audit --json检查 NPM 依赖漏洞 - 正确处理 npm audit 非零返回码(有漏洞时返回非零)
- 按漏洞严重级别统计
🌍 env - 环境变量安全
- 扫描当前进程环境变量中的敏感信息
- 检测已知 API key 格式(sk-、ghp_、xoxb-、AKIA 等)
- 检测环境变量名称中的敏感关键词
🔀 git - Git 安全检查
- 检查 .gitignore 是否忽略了 .env、.secret、credentials 等
- 检查 git credential.helper 是否使用明文存储
- 扫描最近 commit diff 中的密钥模式
🌐 network - 网络端口扫描
- 使用
lsof -i -P -n检查监听端口 - 标记监听 0.0.0.0(全接口暴露)的进程
- 列出所有监听端口清单
🐚 shell - Shell 安全检查
- 检查 .bash_history / .zsh_history 文件权限
- 扫描 .bashrc / .zshrc 中的明文 export 密钥
🍎 macos - macOS 安全检查(仅 macOS)
- 检查防火墙状态(socketfilterfw)
- 检查 Gatekeeper 状态(spctl)
- 检查 SIP 系统完整性保护状态(csrutil)
增强密钥检测
使用正则模式精确匹配已知密钥格式:
| 类型 | 模式 |
|---|---|
| AWS Access Key | AKIA[0-9A-Z]{16} |
| GitHub Token | ghp_[a-zA-Z0-9]{36} / github_pat_ |
| Slack Token | xox[bpas]- |
| OpenAI/Anthropic Key | sk-[a-zA-Z0-9]{20,} |
| JWT Token | eyJ[a-zA-Z0-9_-]+\.eyJ |
| Private Key | -----BEGIN PRIVATE KEY----- |
同时支持 Shannon 信息熵检测(> 4.5 的高熵字符串视为可疑密钥)。
CLI 使用方式
完整审计
python3 scripts/security_audit.py
指定检查模块
python3 scripts/security_audit.py --check permissions env git
过滤严重级别
python3 scripts/security_audit.py --severity high
JSON 输出
python3 scripts/security_audit.py --json
python3 scripts/security_audit.py --json --output report.json
列出可用模块
python3 scripts/security_audit.py --list-checks
静默模式
python3 scripts/security_audit.py --quiet --json --output report.json
配置文件支持
创建 .security-audit.json 自定义审计行为:
{
"excludePaths": [
"/tmp",
"node_modules"
],
"severityThreshold": "medium",
"autoFix": false,
"reportFormat": "markdown"
}
配置文件搜索顺序:
- 当前目录
.security-audit.json ~/.openclaw/.security-audit.json~/.openclaw/workspace/.security-audit.json
飞书报告
发送报告
# 富文本格式(默认)
python3 scripts/send_report_to_feishu.py report.md
# 卡片格式
python3 scripts/send_report_to_feishu.py report.md --format card
# 指定 Webhook
python3 scripts/send_report_to_feishu.py report.md --webhook https://...
支持的消息格式
- text - 纯文本消息
- rich - 飞书富文本(post 类型),包含标题、加粗等样式
- card - 交互式卡片,支持颜色标签(红/橙/绿),摘要卡片化展示
发送方式优先级
- OpenClaw 插件 API(如已配置飞书插件)
- 飞书 Webhook(通过
--webhook或FEISHU_WEBHOOK_URL环境变量) - 保存格式化消息供手动发送
报告格式
审计报告包含以下部分:
📊 执行摘要
- 审计时间、检查范围
- 通过/警告/失败统计
- 风险等级分布(严重/高/中/低)
🔍 详细检查结果
每个检查项包含:状态、风险等级、问题描述、影响范围、修复建议
📋 优先修复清单
按风险等级排序的问题列表,附带修复命令
参考资料
注意事项
- 首次运行可能需要安装额外依赖(
npm audit等) - 某些检查需要 sudo/root 权限(如完整端口扫描)
- macOS 安全检查仅在 Darwin 平台执行
- 报告发送到飞书需要飞书插件已配置或提供 Webhook URL
技能维护者: 小小宝 🐾✨ 最后更新: 2026-03-12
Files
8 totalSelect a file
Select a file to preview.
Comments
Loading comments…
