Install
openclaw skills install security-scanSecurity review workflow for OpenClaw skills and other small code folders. Use when auditing a skill before publishing or installing it, checking for dangerous code patterns, possible hardcoded secrets, risky file permissions, or lightweight supply-chain concerns. Best for quick static review and cautious go/no-go recommendations, not full malware analysis or sandbox forensics.
openclaw skills install security-scanPerform a lightweight security review before trusting, publishing, or installing a skill.
Use this skill to:
This skill is intentionally conservative and lightweight. Treat findings as review signals, not proof of compromise.
Do not claim capabilities that are not present in the bundled resources.
This skill does not provide:
If deeper reverse engineering or threat analysis is needed, do a manual review and use stronger external tooling.
scripts/scan.shRun the included shell scanner for a quick static pass:
bash scripts/scan.sh /path/to/target
The script currently checks for:
eval(, exec(, system(, and spawn(Because the script uses grep-style heuristics, expect both false positives and false negatives.
Confirm what you are reviewing:
From the skill directory:
bash scripts/scan.sh /path/to/target
If the target is the current directory:
bash scripts/scan.sh .
Do not stop at raw matches. Inspect the surrounding code and decide whether each finding is:
Pay special attention to:
Summarize the result in plain language using a simple rubric:
Examples:
Use a compact structure like this:
Security scan summary
- Target: <path>
- Result: Low risk | Needs review | High risk
- Findings:
- <finding 1>
- <finding 2>
- Confidence: Low | Medium | High
- Recommended action: <next step>