ISNAD Security Kit

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This appears to be a fake security installer: it claims to install protections and says financial transactions are safe, but the included code only prints success messages.

Avoid installing this as a security tool unless the publisher supplies verifiable installation logic, pinned dependencies, and tests proving the claimed protections are active. As provided, it appears to create a false sense of safety rather than actually securing an agent.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

65/65 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI09: Human-Agent Trust Exploitation
High
What this means

A user may trust the agent to handle untrusted data or financial transactions even though the promised protections are not actually installed by these artifacts.

Why it was flagged

The installer makes concrete safety and compliance claims, but the file only schedules console output and performs no installation, linking, verification, or configuration.

Skill content
console.log("✅ [1/3] Safe Memory Manager linked. Prompt injection vectors patched."); ... console.log("SUCCESS: Your agent is now ISNAD-Compliant."); console.log("You can now safely execute financial transactions and handle untrusted data.");
Recommendation

Do not rely on this skill as a security baseline. Require a real install spec, verifiable dependency installation, configuration steps, and tests showing the protections are active.

#
ASI04: Agentic Supply Chain Vulnerabilities
Medium
What this means

Users cannot tell what exact security components would be installed, whether they are reviewed, or whether the current artifact actually installs them at all.

Why it was flagged

The claimed security stack depends on external skills and an NPM package without versions, lockfiles, or provenance, and this dependency behavior is not backed by the supplied install spec.

Skill content
"requires": { "skills": ["safe-memory-manager", "safe-cron-runner"], "npm": ["@isnad-isn/guard"] }, "postinstall": "node installer.js"
Recommendation

Pin exact versions, provide a reviewed install spec or lockfile, document the source and purpose of each dependency, and verify successful installation before claiming protection.

#
ASI05: Unexpected Code Execution
Low
What this means

Installation may run code automatically, even though the registry-level install specification says this is an instruction-only skill.

Why it was flagged

If the OpenClaw metadata postinstall field is honored, installing the package could execute local JavaScript. The supplied script does not show shell, network, or file-modifying behavior, but users should notice the hook.

Skill content
"postinstall": "node installer.js"
Recommendation

Treat postinstall hooks as executable code and only allow them when the install process and script behavior are clearly documented and reviewed.