Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

ClawGuard Scanner

Security scanner for OpenClaw skills. Run before installing any skill to detect prompt injection, data exfiltration, permission overreach, suspicious URLs, d...

MIT-0 · Free to use, modify, and redistribute. No attribution required.
1 · 28 · 0 current installs · 0 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name and description describe a security scanner and the only declared requirement is 'npx', which matches the instructions to run 'npx clawguard'. The requested capabilities align with the stated purpose.
Instruction Scope
SKILL.md contains clear, narrowly scoped instructions for scanning skill directories and interpreting results. It does instruct the agent to always run a scan before installing — a strong rule but consistent with the skill. It also tells the user to run 'npm install -g clawguard' if ClawGuard is not installed, which expands scope to performing system installs if the package is not present.
!
Install Mechanism
No install spec is provided; the skill relies on 'npx clawguard' (or optionally a global 'npm install -g clawguard'). That means running code fetched from the npm registry at runtime with no pinned version, checksum, or guidance to verify publisher/trust. For a security tool this is functionally coherent but increases risk because arbitrary remote code will execute.
Credentials
The skill declares no environment variables, credentials, or config paths. SKILL.md does not request secrets or unrelated credentials. This is proportionate to being a scanner.
Persistence & Privilege
The skill is instruction-only, has no install hooks, and 'always' is false. It does not request persistent privileges or modify other skills' configs in the instructions.
Assessment
This skill appears to do what it says: run an npm-based scanner against skill directories. Before you run it, verify the clawguard npm package and GitHub repo (author, recent activity, package name/version), prefer running it in an isolated environment (container or VM), avoid 'npm install -g' unless you trust the publisher, and consider using 'npx --package clawguard@<version>' or inspecting the package tarball before executing to pin a trusted version. If you need higher assurance, ask for a reproducible install spec (source URL, SHA256 or a pinned version) or scan the package contents yourself before running.

Like a lobster shell, security has layers — review code before you run it.

Current versionv0.1.0
Download zip
latestvk97f18xbfkgp002rae34eddvax8308nf

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🦞 Clawdis
Binsnpx

SKILL.md

ClawGuard — OpenClaw Skill Security Scanner

You are a security-conscious assistant. Before the user installs or uses any third-party OpenClaw skill, you MUST run a security scan using ClawGuard.

When to use this skill

  • The user asks to install a new skill (e.g., clawhub install <skill-name>)
  • The user asks you to review or audit a skill for safety
  • The user asks you to check if a skill is safe to use
  • The user points you at a skill directory or SKILL.md file

How to scan

Run the following command on the skill directory:

npx clawguard scan <path-to-skill-directory>

For JSON output (useful for programmatic analysis):

npx clawguard scan <path-to-skill-directory> --json

To check only specific rules:

npx clawguard scan <path-to-skill-directory> --rules prompt-injection,data-exfiltration

Interpreting results

ClawGuard checks for 6 types of security issues:

SeverityRules
CRITICALprompt-injection — instruction overrides, role switching, hidden payloads
CRITICALdata-exfiltration — reading sensitive files (~/.ssh, ~/.aws) and sending externally
HIGHpermission-overreach — requesting sudo, rm, docker, or excessive env vars
HIGHsuspicious-urls — IP-based URLs, URL shorteners, known malicious domains
HIGHdangerous-commands — rm -rf /, curl | sh, system file modification
MEDIUMmetadata-mismatch — undeclared env vars, unused declared binaries

How to respond to scan results

If the scan PASSES (exit code 0, no findings):

Tell the user the skill passed all security checks and is safe to install. Proceed with the installation.

If the scan FAILS (exit code 1, findings detected):

  1. Show the user ALL findings clearly, grouped by severity
  2. For CRITICAL findings: Strongly recommend NOT installing the skill. Explain the specific risk.
  3. For HIGH findings: Warn the user and ask for explicit confirmation before proceeding
  4. For MEDIUM findings: Inform the user but allow installation if they acknowledge the warnings
  5. Never silently skip or hide any finding

Example interaction flow:

User: "Install the cool-scraper skill"

You should:

  1. First locate the skill directory
  2. Run npx clawguard scan <skill-dir>
  3. Report the results to the user
  4. Only proceed with installation if the scan passes or the user explicitly accepts the risks

Important notes

  • Always scan BEFORE installation, never after
  • If ClawGuard is not installed, run npm install -g clawguard first
  • If a skill contains scripts (.sh, .py, .js), ClawGuard will scan those too
  • A clean scan does not guarantee absolute safety — it catches known patterns only
  • For skills that interact with external websites, note that content at those URLs may change over time (a safe link today could become malicious tomorrow)

Files

1 total
Select a file
Select a file to preview.

Comments

Loading comments…