ClawGuard by jugaad-lab
v1.3.1Security blacklist protecting AI agents from malicious skills, scams, and prompt injection. Use before executing external commands, visiting unknown URLs, or installing new skills. Triggers on "security check", "is this safe", "check this URL", or suspicious command patterns.
⭐ 0· 1.2k·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name/description (security blacklist, pre‑action checks, MCP scanner) match the included code and docs: a Node.js CLI + OpenClaw plugin, a local SQLite DB, pattern matching, audit trail, and an MCP configuration scanner. Required resources are local files (db, config, audit) and optional Discord integration — all are reasonable for a security tool of this type.
Instruction Scope
SKILL.md and PLUGIN.md explicitly instruct the agent to: install/run a Node.js package, enable a plugin that hooks into OpenClaw's before_tool_call event, run pre‑exec/pre‑install hooks, and check commands/URLs/messages prior to action. This is consistent with the purpose. Two things to note: (1) SKILL.md includes examples of prompt‑injection strings (e.g. "Ignore previous instructions") — these appear as detection test vectors (expected), and (2) the instructions direct the tool to log full inputs (commands/messages) to the local audit JSONL file, which may capture sensitive data (API keys, secrets, private commands) if not redacted.
Install Mechanism
No remote download install spec is present in the registry metadata — the package is shipped as source files and expects npm install / local install. Dependencies are limited (uses better-sqlite3). There are no opaque external URLs used for automatic code execution in the manifest excerpts provided. This is a normal install model for a Node CLI/plugin.
Credentials
The skill requests no environment variables or credentials in the manifest, which aligns with the registry metadata. However, the tool (by design) reads many local configuration files when running the MCP scanner and writes an audit trail and database under ~/.clawguard. It also supports optional Discord approval which will send potentially sensitive check inputs to an external Discord channel if enabled. Default config shows autoSync:true and a repoUrl (GitHub) — so the package may perform network sync/update operations unless you disable that. These behaviors are coherent with the stated features but carry privacy/leakage risk (audit logs and Discord transmission of raw inputs; wide filesystem reads).
Persistence & Privilege
always:false (good). The plugin asks to be installed into OpenClaw's plugins so it can hook into before_tool_call; this is an expected privilege for a security plugin. It writes to its own config/db/audit files under the user's home directory (~/.clawguard) — standard for a CLI. Because it can block execution and (optionally) invoke external approval, enabling it gives it meaningful control over the agent's actions; that control is appropriate for a security enforcement tool but increases impact if the package were malicious.
Scan Findings in Context
[ignore-previous-instructions] expected: The SKILL.md and other docs include prompt‑injection example strings (e.g. 'Ignore previous instructions') as detection test cases. The scanner flag indicates presence of that pattern, which is expected for a tool that detects prompt injection.
Assessment
What to consider before installing ClawGuard:
- Purpose fit: This package is internally consistent: it implements a local threat DB, an OpenClaw plugin that hooks before tool calls, an MCP config scanner, and CLI hooks to check commands/URLs/skills. If you want a pre‑action security layer, the design matches that goal.
- Audit trail (sensitive data): By default it logs full inputs to ~/.clawguard/audit.jsonl and stores checks in a local DB. Those logs can contain commands, URLs, or message texts that include secrets (API keys, tokens, private commands). If you install it, plan retention/rotation, restrict filesystem access, or modify logging to redact secrets.
- Discord approvals = data leaving your host: Enabling the Discord approval feature will post check details (inputs and threat info) to a Discord channel. Only enable this if you control the channel, trust the community members there, and understand that potentially sensitive inputs will leave the machine.
- MCP scanner scope: The MCP scanner auto‑discovers configs for many tools (Claude Desktop, Cursor, VS Code, etc.). That means it will read local app config files and may surface secrets. This behavior is expected for configuration auditing but you should run it in a controlled environment and review which paths it inspects.
- Auto‑sync/network activity: Default config shows autoSync:true with a GitHub repo URL. If you require strictly offline/local operation, disable autoSync or review the sync implementation to ensure it only pulls known updates and doesn't leak telemetry.
- Privileged integration: Enabling the OpenClaw plugin gives the package the ability to intercept and block tool calls. This is appropriate for a security enforcer, but verify the plugin code (openclaw-plugin.js) and test in a non‑production/sandboxed agent environment before enabling globally.
- Verify code and permissions: Although the package appears coherent (no unexpected env var asks, no remote install URLs), you should inspect/verify: database sync code, any network calls the package makes (sync/report), and the Discord integration implementation. Consider running npm install in a sandbox and reviewing the package.json scripts and any postinstall hooks.
- Suggested safe defaults before enabling broadly: set level=0 (silent) while evaluating, disable autoSync, keep discord.enabled=false, review and restrict audit access, and run the MCP scanner on a test machine first.
If you want, I can: (1) scan the remaining truncated source files for network calls or secrets exfiltration patterns, (2) list the exact files that write to disk or perform network requests, or (3) produce recommended config changes (example config JSON) to limit exposure.Like a lobster shell, security has layers — review code before you run it.
electron-essentialvk9750nzpgpafkz6f0j4s8fs3vs80t83qlatestvk9750nzpgpafkz6f0j4s8fs3vs80t83qmcpvk97ef9h1yfg8szt90r8z98svvs80rr0wsafetyvk97ef9h1yfg8szt90r8z98svvs80rr0wsecurityvk97ef9h1yfg8szt90r8z98svvs80rr0wthreat-intelligencevk97ef9h1yfg8szt90r8z98svvs80rr0w
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🛡️ Clawdis
