Scan any ClawHub skill before installing it. 534 out of 3,984 ClawHub skills contained critical vulnerabilities — credential theft, prompt injection, data ex...
Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for daririnch/dcl-skill-auditor.
Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "DCL Skill Auditor — Pre-Install Security Scanner" (daririnch/dcl-skill-auditor) from ClawHub.
Skill page: https://clawhub.ai/daririnch/dcl-skill-auditor
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.
Command Line
CLI Commands
Use the direct CLI path if you want to install manually and keep every step visible.
The SKILL.md describes a local, instruction-only static auditor that asks users to paste SKILL.md and scripts and performs pattern checks. It does not request unrelated credentials, binaries, or filesystem paths, so required capabilities are proportionate. Minor metadata inconsistency: registry version 1.0.2 vs SKILL.md version 1.1.0 and no homepage/source URL, which lowers provenance confidence.
ℹ
Instruction Scope
Runtime instructions remain within the stated scope (compute hashes, scan pasted files, run checklist). The auditor asks the user to paste skill files into the conversation — this is necessary for operation but means users must avoid pasting secrets. The SKILL.md's checklist references patterns like '~/.ssh' etc. as detection rules (strings to match), not as instructions to read system files; that distinction should be observed when running the skill.
✓
Install Mechanism
No install spec and no code files — instruction-only skill. No downloads or archive extraction are performed or required, minimizing install-time risk.
✓
Credentials
The skill declares no required environment variables, credentials, or config paths. The checklist searches for credential-related patterns in user-provided content but does not itself request secrets or external credentials.
✓
Persistence & Privilege
always is false and there is no install or persistent component. The skill does not request to modify system or agent configuration and does not claim autonomous persistent execution.
Assessment
This skill appears internally consistent for a local, instruction-only pre-install scanner, but exercise caution before using it with sensitive content. Do not paste API keys, private keys, or other secrets into the conversation; redact or replace them when testing. Note the registry metadata/version mismatch and lack of homepage or source — verify the publisher separately if provenance matters. Because the skill is instruction-only, you can (and should) test it first on a small, benign SKILL.md to verify outputs and the DCL proof format before scanning real skill packages. If you need higher assurance, run an equivalent scan locally (using a copy of the SKILL.md and scripts) rather than pasting secrets into any hosted agent context.
Like a lobster shell, security has layers — review code before you run it.
latestvk971en8nfxe08hr1x6aqmjg4ns84r800
127downloads
0stars
3versions
Updated 1w ago
v1.0.2
MIT-0
DCL Skill Auditor
Publisher: @daririnch · Fronesis Labs Version: 1.1.0 Part of: Leibniz Layer™ Security Suite
What this skill does
DCL Skill Auditor performs static security analysis on any ClawHub skill before
installation. It examines the skill's SKILL.md, scripts, and manifest against
30+ known malicious patterns drawn from real ClawHavoc incidents, and returns a
structured verdict with a deterministic audit proof.
This skill is 100% instruction-only. No external network calls are made.
No skill content leaves the agent's context. The analysis runs entirely within
the agent using the checklist and reasoning chain below.
Excessive permission requests vs. declared functionality
Behavioral mismatch
Stated purpose vs. actual instructions inconsistency
Silent side effects not documented in description
Update drift — new version doing more than previous
How to run an audit
The user provides skill content directly — paste SKILL.md (and any scripts)
into the conversation. This skill performs no network requests and does
not fetch content from any external source.
How to get skill content for auditing:
On ClawHub: open skill page → "Download zip" → extract → paste SKILL.md
Or copy raw SKILL.md text directly from the skill's page
Step 1 — Confirm content is in context
Verify SKILL.md (and any scripts) are present in the conversation.
If not provided, ask the user to paste them. Do not fetch from any URL.
Step 2 — Compute skill fingerprint
Before analysis, compute:
skill_hash = SHA-256(raw SKILL.md content + all script contents)
Record this as the immutable identifier for this audit.
Step 3 — Run the 30+ pattern checklist
Go through every category in the Detection Checklist below.
For each pattern found, record:
pattern_id — which rule triggered
location — file name and line (e.g. SKILL.md:42, scripts/run.sh:17)
The dcl_proof string is a self-contained, reproducible audit identifier.
Anyone with the same skill content can re-run the audit and verify the hash matches.
Detection Checklist
Work through each item. Mark CLEAR or record finding with evidence.
The dcl_proof string is designed to be committable to the DCL Evaluator
audit chain for permanent tamper-evident recording. To do so after the audit:
# After running DCL Skill Auditor, optionally commit to DCL chain:
dcl_commit(
proof=audit_result["dcl_proof"],
skill_hash=audit_result["skill_hash"],
verdict=audit_result["verdict"],
agent_id="your-agent-id"
)
This step is optional and performed by the caller — not by this skill.
DCL Skill Auditor itself makes no external calls.
Integration patterns
Pre-install gate (recommended)
User: "Install skill X"
│
▼
DCL Skill Auditor ──► BLOCK? → Refuse install, show findings
│ PASS / WARN
▼
Proceed with install (WARN: show findings to user first)
Full DCL Security Suite pipeline
New skill detected / update available
│
▼
DCL Skill Auditor ← is the skill itself safe?
│ PASS
▼
DCL Policy Enforcer ← does skill output comply with policies?
│ COMMIT
▼
DCL Sentinel Trace ← does output expose PII?
│ COMMIT
▼
DCL Semantic Drift Guard ← is output grounded in source?
│ IN_COMMIT
▼
Safe to deliver
CI/CD agent pipeline
for skill in pending_installs:
audit = dcl_skill_auditor(skill.content)
if audit["verdict"] == "BLOCK":
reject(skill, audit["findings"])
elif audit["verdict"] == "WARN":
flag_for_human_review(skill, audit)
else:
approve(skill)
When to use this skill
Before installing any new skill from ClawHub
When a trusted skill receives an update (detect update drift)
In enterprise agent pipelines requiring pre-execution security checkpoints
For compliance teams needing auditable records of which skills were vetted
When building skill marketplaces or curated skill registries
After ClawHavoc-style incidents to retroactively audit installed skills
Privacy & Data Policy
This skill is operated by Fronesis Labs and is 100% instruction-only.
No data leaves the agent. All analysis runs entirely within the agent's
context window. No network requests are made. No skill content is transmitted
to any server — not even to Fronesis Labs infrastructure.
No retention. Nothing is stored, logged, or transmitted. The only artifact
produced is the structured JSON output and dcl_proof string, which remain
within the agent's session unless the caller explicitly saves them.
How to use safely: paste the target skill's SKILL.md directly into the
conversation. The agent analyzes it locally against the checklist in this document.