Destructive Command Guard

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: destructive-command-guard Version: 1.0.0 The OpenClaw AgentSkills skill bundle 'destructive-command-guard' is classified as benign. Its core functionality involves intercepting and blocking dangerous commands, which inherently requires high-privilege capabilities such as modifying AI agent configuration files (`~/.claude/settings.json`), installing shell hooks (`.git/hooks/pre-commit`), and executing system commands. The `install.sh` script, while downloading and executing remote code, includes checksum and sigstore verification, which is a strong indicator against malicious intent. All identified risky behaviors are directly aligned with the stated purpose of a security guard tool, and there is no evidence of intentional harmful actions like data exfiltration, unauthorized persistence, or stealthy backdoors. The `SKILL.md` is purely descriptive and contains no prompt injection attempts.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user may believe destructive non-core commands are blocked when the actual hook path may allow them.

Why it was flagged

The artifact itself describes a current protection gap that can contradict the README/SKILL claims about broad Docker, Kubernetes, database, cloud, and other pack coverage.

Skill content
Non-Core Packs Are Unreachable in Hook Mode ... enabled packs can silently not run ... `dcg test` might report "BLOCKED," while the actual hook would allow the same command.
Recommendation

Before relying on this as a safety layer, test hook-mode behavior for every enabled pack and treat broad pack claims as unverified until the maintainer demonstrates the gap is fixed.

What this means

Installing this way can run code that differs from the reviewed package version.

Why it was flagged

The recommended quick install executes a mutable remote script from the master branch with cache busting, rather than a pinned reviewed artifact.

Skill content
curl -fsSL "https://raw.githubusercontent.com/Dicklesworthstone/destructive_command_guard/master/install.sh?$(date +%s)" | bash -s -- --easy-mode
Recommendation

Prefer a pinned release with checksum verification or review the installer locally before running it; the maintainer should publish a pinned install spec for the registry version.

ConcernMedium Confidence
ASI06: Memory and Context Poisoning
What this means

Shell commands can contain secrets, tokens, private paths, or project-sensitive details that may remain in local history or exports.

Why it was flagged

The tool sees shell commands, and these dependency comments indicate persistent telemetry/history storage and export. The provided artifacts do not clearly bound what command data is stored, redacted, retained, or exported.

Skill content
rusqlite = { version = "0.35", features = ["bundled"] }  # Telemetry database ... flate2 = "1.0"  # Gzip compression for history export
Recommendation

Review and configure history/telemetry settings before use, clear stored history if not needed, and avoid putting secrets directly in shell commands.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

The tool can affect future agent command execution by allowing or denying commands.

Why it was flagged

A persistent command hook is central to the stated purpose and is disclosed, but it will continue mediating agent shell commands once installed.

Skill content
Claude Code calls `dcg` as a `PreToolUse` hook: ... Extract Bash command string ... Quick reject / keyword gating
Recommendation

Understand where the hook is installed, keep an uninstall path available, and verify that its allow/deny policy matches your workflow.

What this means

Connected agents may be able to ask the tool to inspect commands or files, depending on how the MCP server is enabled.

Why it was flagged

MCP/server integration and file scanning are purpose-aligned, but they create an agent-facing interface that can process command text and selected file contents.

Skill content
dcg includes an MCP server mode (`dcg mcp-server`) exposing: - `check_command`: Evaluate a command - `scan_file`: Scan files for destructive commands - `explain_pattern`: Explain a dcg rule
Recommendation

Enable MCP mode only for trusted agents and projects, and confirm what file paths the connected agent is allowed to scan.