ClawGuard Scanner

PassAudited by ClawScan on May 1, 2026.

Overview

The skill is coherent for a security-scanning purpose, but users should know it relies on running an external npm/npx scanner and should not treat a clean scan as a complete safety guarantee.

This skill appears appropriate for scanning other OpenClaw skills before installation. Before relying on it, verify the external `clawguard` npm package is the one you intend to run, and remember that a clean scan reduces risk but does not prove a skill is fully safe.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing or running the scanner may fetch and execute external package code on the user's machine.

Why it was flagged

The skill may install an external npm package globally, and the artifact does not pin a package version. This is aligned with a CLI scanner but depends on the npm package source.

Skill content
If ClawGuard is not installed, run `npm install -g clawguard` first
Recommendation

Confirm the npm package and repository are the expected ClawGuard project before first use, and prefer a pinned or reviewed version where possible.

What this means

A user may over-trust a clean scan even though static pattern checks can miss some unsafe behavior.

Why it was flagged

The instruction could encourage strong reliance on a clean scanner result, although the artifact also notes that a clean scan does not guarantee absolute safety.

Skill content
Tell the user the skill passed all security checks and is safe to install. Proceed with the installation.
Recommendation

Treat a pass as a useful signal, not a complete guarantee; review permissions and behavior for high-impact skills before installation.