skill-security-scanner-clean

v1.0.0

Security scanner for OpenClaw skills. Use when installing, updating, or auditing skills to detect malicious backdoors, suspicious code patterns, data exfiltr...

0· 326·2 current·2 all-time
byRUI LIU@cookiemikeliu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included files: SKILL.md, scripts/security_scanner.py, and an install guard. The scanner implements pattern-based detection for eval/exec, network calls, file ops, env access, obfuscation, etc., which is appropriate for a security scanner. No unrelated credentials, binaries, or external services are requested.
Instruction Scope
SKILL.md and scripts instruct the agent/human to run the scanner against a skill directory and to incorporate it into install workflows. That is within scope. Notes: (1) Detection rules explicitly flag some legitimate hosting services and IP literals (e.g., gist.github.com, drive.google.com, dropbox.com, raw IPs), which is an overbroad heuristic that will cause false positives in otherwise legitimate skills. (2) Some regexes (e.g., obfuscation patterns) are coarse and may trigger on large/minified legitimate files. (3) The install_guard will save a .security_scan_report.json into the scanned skill directory (which is useful but adds an artifact to the scanned path).
Install Mechanism
There is no install spec; this is effectively an instruction + code bundle. No remote downloads, package managers, or archive extractions are performed by the skill itself. Code files are present in the package and executed locally; that is expected for this tool.
Credentials
The skill declares no required environment variables, no credentials, and no privileged config paths. The scanner code does look for environment-accessing patterns in scanned code (appropriate for its purpose) but does not itself attempt to read the host environment or request secrets.
Persistence & Privilege
The skill does not request permanent 'always' presence and uses normal model invocation. It will write a .security_scan_report.json into the scanned skill directory when run via the install_guard, which is reasonable for an audit tool but worth knowing (artifact persistence). It does not modify other skills' configs or system-wide settings.
Assessment
This skill appears to do what it says: a local static scanner for OpenClaw skills. Before installing or relying on it, consider the following: 1) Source provenance: the package has no homepage and the owner is unknown — review the code yourself or prefer a scanner from a trusted, verifiable source. 2) False positives: some detection rules are broad (flags for common hosts, IPs, or large/minified files); treat 'WARNING'/'REVIEW' results as prompts for manual inspection rather than automatic rejection. 3) Artifacts: the install guard saves a .security_scan_report.json inside the scanned skill directory — ensure you are comfortable with that artifact being created. 4) Safe testing: run the scanner on known-good and known-bad samples in an isolated environment to validate its behavior and tune expectations (or strict mode). 5) If you plan to integrate this into automation, review the scoring/verdict thresholds in references/rules-reference.md and consider whitelisting legitimate patterns to reduce noise.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cg7ayjgpx6daeb4jrwe0ks581zmbq

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments