Senseguard

v1.0.1

Semantic security scanner for OpenClaw skills. Detects prompt injection, data exfiltration, and hidden instructions that traditional code scanners miss. Use when user asks to scan skills, check skill safety, or run a security audit.

1· 1.6k·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name, description, and bundled code (rule engine, semantic analyzer, scanner, reputation scorer, rules) align with a semantic security scanner. It searches installed skills under ~/.openclaw/skills and workspace 'skills' which is expected for this purpose. The engine intentionally examines file types like .env and SKILL.md to find credential/exfiltration patterns — that is coherent for a security scanner, but may be surprising because it implies the tool will read sensitive files.
!
Instruction Scope
SKILL.md instructs the agent to run python scripts and to process a generated 'layer2_prompt' via the agent/LLM and feed the JSON back. That is necessary for semantic layer analysis but means the full skill content (potentially including secrets read from .env or other files) may be sent to whatever LLM the agent uses. The SKILL.md also contains example malicious phrases (e.g., 'ignore all previous instructions'), which triggered the pre-scan injection detector; this is expected for a scanner that demonstrates what to detect, but it also means the skill intentionally crafts test cases that match prompt-injection patterns.
Install Mechanism
No remote install hooks or downloads are declared; this is an instruction + bundled-code skill with no network-based install. That lowers supply-chain/install risk. All code is included in the package.
Credentials
The skill does not request environment variables or credentials, which matches its stated purpose. However, it explicitly scans files like .env, SKILL.md, and other text assets for secrets/patterns. Reading these files is logically consistent for a security scanner but is privacy-sensitive because scan output and cache may retain snippets of sensitive data.
!
Persistence & Privilege
always:false and the scanner does not attempt to modify other skills, but it writes persistent cache data to ~/.openclaw/senseguard/cache.json and stores scan results (including layer2_prompt and findings). That persistent storage can contain evidence snippets or generated prompts. The scanner's Layer 2 workflow also relies on the agent/LLM to process prompts — if you permit the agent to run Layer 2, scanned content may be transmitted to the LLM provider. Both cache persistence and LLM-driven analysis increase blast radius for accidental data exposure.
Scan Findings in Context
[PI001] expected: Pre-scan detector flagged 'ignore previous instructions' text in SKILL.md. SenseGuard intentionally includes example malicious phrases (used to explain prompt-injection) so this detection is expected for a scanner that demonstrates detection patterns.
What to consider before installing
SenseGuard appears to implement the scanner it claims to be, but there are privacy and persistence trade-offs you should consider before installing: - It reads many text files (including .env and other config-like files) when scanning to detect exfiltration and credential access — expect sensitive values to be read during scans. - The tool caches scan results to ~/.openclaw/senseguard/cache.json. That cache can contain evidence snippets and generated prompts; inspect or encrypt/relocate the cache if you don't want scan artifacts stored in your home directory, or run with --no-cache. - Semantic (Layer 2) analysis is performed by sending a constructed prompt to an LLM (the agent). If you enable deep/Layer 2 scanning or allow autonomous model invocation, the full skill content can be transmitted to the LLM provider. If that is unacceptable, avoid deep scans or run the tool in an isolated environment and/or ensure the LLM endpoint is trusted. - The SKILL.md contains example malicious phrases (prompt-injection test cases) which triggered the pre-scan detector — this is expected for a scanner, not proof of malicious intent. Recommendations before installing or running: - Review the source files yourself (they are bundled) and verify the cache path and contents. - Run initial scans in a controlled environment (sandbox or VM) and use --no-cache when scanning sensitive skills. - If you need semantic Layer 2 analysis, decide whether your LLM provider and data-handling policies are acceptable for sending full skill content. - If you have low tolerance for persistent artifacts, consider editing CacheManager to encrypt the cache or change the cache file location before use. If you want, I can (a) point out exact lines that write/store layer2_prompt or evidence to the cache/report, (b) show how to run the scanner without Layer 2 or without caching, or (c suggest a minimal patch to avoid persisting evidence text in the cache.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fn5kd04v8bh12ecpytyktm580p161scannervk97dh2txyfctkdp0crzzpnddws80pxq4securityvk97dh2txyfctkdp0crzzpnddws80pxq4semantic-analysisvk97dh2txyfctkdp0crzzpnddws80pxq4

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments