Audit Code
PassAudited by VirusTotal on May 12, 2026.
Overview
Type: OpenClaw Skill Name: audit-code Version: 1.1.1 The bundle is a legitimate security auditing tool designed to perform static analysis on source code to identify vulnerabilities, hardcoded secrets, and supply chain risks. The core logic in `scripts/audit_code.py` and `scripts/patterns.py` uses an extensive database of regex patterns to detect modern attack vectors, including AI-specific prompt injections and MCP tool poisoning. While the tool performs network requests to PyPI and npm registries, these are functionally justified for verifying package legitimacy to prevent 'slopsquatting' or hallucinated dependency attacks, and no evidence of data exfiltration or malicious intent was found.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The agent can run the bundled scanner over the selected path; an overly broad or unintended path could cause more local files to be read than the user expected.
The skill grants Bash and tells the agent to run a local Python auditor. This shell use is fixed and central to the stated code-review purpose, but it is still a tool-execution capability users should notice.
allowed-tools: Read, Glob, Grep, Bash ... python3 "$SKILL_DIR/scripts/audit_code.py" "$ARGUMENTS"
Invoke it only for repositories you want audited, and provide an explicit target path if you do not want the whole project scanned.
Secrets or sensitive file paths from the repository could appear in the audit output or conversation if the results are shared.
The scanner intentionally reads .env files and scans their contents for secrets. That is purpose-aligned for a security audit, but it means credential-like material may be processed and surfaced in local findings.
content = env_file.read_text(encoding="utf-8", errors="replace"); findings.extend(Scan_Content(content, Secrets_Patterns, str(env_file)))
Run it in a trusted workspace, treat raw reports as sensitive, and rotate any real secrets found in committed files.
