Back to skill
Skillv2.0.0

ClawScan security

Skill Security Audit Enhanced · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignApr 15, 2026, 3:52 AM
Verdict
Benign
Confidence
high
Model
gpt-5-mini
Summary
This is internally coherent: a local Python-based skill-audit scanner with bundled IOC data and detectors that matches its description and does not request unrelated credentials or install external code.
Guidance
This skill appears consistent with its stated purpose (a local scanner). Before running it: review scripts/skill_audit.py and scripts/ioc_database.json yourself; prefer running scans targeted to specific skill folders (use --path) rather than broad system scans; do not run the scanner as root unless you understand why elevated access is needed; treat the scan output as potentially containing sensitive snippets (paths, lines) and handle evidence carefully; if you need stronger isolation, run it in a VM or container; verify the skill's provenance (author, repository) and consider comparing hashes of the shipped files if you retrieved them from a third party.

Review Dimensions

Purpose & Capability
okThe name/description (skill audit) match the included artifacts: a pure‑Python scanner (scripts/skill_audit.py), an IOC DB, and documentation of the 13 detectors. No unrelated environment variables, binaries, or install steps are requested. Minor inconsistency: some example commands in SKILL.md reference differing absolute paths (e.g., /root/.openclaw/... vs ~/.claude/...), but this is a documentation/path mismatch rather than a capability mismatch.
Instruction Scope
noteThe runtime instructions tell the agent to run the bundled scanner which auto-discovers and reads skill directories (e.g., ~/.claude, ~/.openclaw, /usr/local/lib/node_modules/openclaw/skills). This is expected for a scanner, but it means the tool will read many files under user/home skill locations and may surface sensitive lines (file paths, snippets). The SKILL.md also includes remediation commands (ps, lsof, crontab, moving files) — appropriate for incident response but they require care (permissions/privilege) and the documentation uses several absolute paths that are inconsistent.
Install Mechanism
noteThere is no install spec (instruction-only), and the scanner is pure stdlib Python bundled with the skill (no external downloads). That reduces supply-chain risk relative to remote installers. However, running the skill executes code shipped inside the skill bundle (scripts/skill_audit.py), so users should inspect that file before execution — this is normal for local tools but a point to be aware of.
Credentials
okThe skill declares no required environment variables or credentials. The scanner intentionally looks for indicators related to credentials and sensitive paths (e.g., ~/.ssh, ~/.aws) as part of detection, which is appropriate for its purpose; it does not request access tokens or external secrets in metadata.
Persistence & Privilege
okThe skill does not request permanent inclusion (always:false) and does not modify other skills or system-wide agent settings. It can be invoked autonomously by the agent (platform default), which is expected for skills; this by itself is not a red flag here.