Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Openclaw Action

v1.0.0

GitHub Action for automated security scanning of agent workspaces. Detects exposed secrets, prompt/shell injection, and data exfiltration patterns in PRs and commits.

0· 805· 1 versions· 2 current· 2 all-time· Updated 13h ago· MIT-0

Install

openclaw skills install openclaw-action

OpenClaw Security Action

GitHub Action that scans agent skills for security issues on every PR.

What It Scans

ScannerWhat It Catches
sentryAPI keys, tokens, passwords, credentials in code
bastionPrompt injection markers, shell injection patterns
egressSuspicious network calls, data exfiltration patterns

Quick Start

Add to .github/workflows/security.yml:

name: Security Scan
on:
  pull_request:
    paths:
      - 'skills/**'
      - '.openclaw/**'
  push:
    branches: [main]

jobs:
  scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - uses: AtlasPA/openclaw-action@v1
        with:
          workspace: '.'
          fail-on-findings: 'true'

Inputs

InputDefaultDescription
workspace.Path to scan
fail-on-findingstrueFail the check if issues found
scan-secretstrueEnable secret scanning
scan-injectiontrueEnable injection scanning
scan-egresstrueEnable egress scanning

Outputs

OutputDescription
findings-countTotal number of issues found
has-criticaltrue if critical/high severity issues

Philosophy

This action detects and alerts only. It will:

  • Flag security issues in PR checks
  • Annotate specific lines with findings
  • Generate a summary report

It will NOT:

  • Automatically modify your code
  • Quarantine or delete files
  • Make any changes to your repository

For automated remediation, see OpenClaw Pro.

Requirements

  • Python 3.8+ (auto-installed by action)
  • No external dependencies

Version tags

latestvk973gwg3rwk29k9jt47tx8batx810xcm

Runtime requirements

🛡️ Clawdis
OSmacOS · Linux · Windows
Binspython3