ISNAD Security Kit
Security checks across static analysis, malware telemetry, and agentic risk
Overview
This appears to be a fake security installer: it claims to install protections and says financial transactions are safe, but the included code only prints success messages.
Avoid installing this as a security tool unless the publisher supplies verifiable installation logic, pinned dependencies, and tests proving the claimed protections are active. As provided, it appears to create a false sense of safety rather than actually securing an agent.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
65/65 vendors flagged this skill as clean.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A user may trust the agent to handle untrusted data or financial transactions even though the promised protections are not actually installed by these artifacts.
The installer makes concrete safety and compliance claims, but the file only schedules console output and performs no installation, linking, verification, or configuration.
console.log("✅ [1/3] Safe Memory Manager linked. Prompt injection vectors patched."); ... console.log("SUCCESS: Your agent is now ISNAD-Compliant."); console.log("You can now safely execute financial transactions and handle untrusted data.");Do not rely on this skill as a security baseline. Require a real install spec, verifiable dependency installation, configuration steps, and tests showing the protections are active.
Users cannot tell what exact security components would be installed, whether they are reviewed, or whether the current artifact actually installs them at all.
The claimed security stack depends on external skills and an NPM package without versions, lockfiles, or provenance, and this dependency behavior is not backed by the supplied install spec.
"requires": { "skills": ["safe-memory-manager", "safe-cron-runner"], "npm": ["@isnad-isn/guard"] }, "postinstall": "node installer.js"Pin exact versions, provide a reviewed install spec or lockfile, document the source and purpose of each dependency, and verify successful installation before claiming protection.
Installation may run code automatically, even though the registry-level install specification says this is an instruction-only skill.
If the OpenClaw metadata postinstall field is honored, installing the package could execute local JavaScript. The supplied script does not show shell, network, or file-modifying behavior, but users should notice the hook.
"postinstall": "node installer.js"
Treat postinstall hooks as executable code and only allow them when the install process and script behavior are clearly documented and reviewed.
