Audit Code

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: audit-code Version: 1.1.1 The bundle is a legitimate security auditing tool designed to perform static analysis on source code to identify vulnerabilities, hardcoded secrets, and supply chain risks. The core logic in `scripts/audit_code.py` and `scripts/patterns.py` uses an extensive database of regex patterns to detect modern attack vectors, including AI-specific prompt injections and MCP tool poisoning. While the tool performs network requests to PyPI and npm registries, these are functionally justified for verifying package legitimacy to prevent 'slopsquatting' or hallucinated dependency attacks, and no evidence of data exfiltration or malicious intent was found.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent can run the bundled scanner over the selected path; an overly broad or unintended path could cause more local files to be read than the user expected.

Why it was flagged

The skill grants Bash and tells the agent to run a local Python auditor. This shell use is fixed and central to the stated code-review purpose, but it is still a tool-execution capability users should notice.

Skill content
allowed-tools: Read, Glob, Grep, Bash ... python3 "$SKILL_DIR/scripts/audit_code.py" "$ARGUMENTS"
Recommendation

Invoke it only for repositories you want audited, and provide an explicit target path if you do not want the whole project scanned.

What this means

Secrets or sensitive file paths from the repository could appear in the audit output or conversation if the results are shared.

Why it was flagged

The scanner intentionally reads .env files and scans their contents for secrets. That is purpose-aligned for a security audit, but it means credential-like material may be processed and surfaced in local findings.

Skill content
content = env_file.read_text(encoding="utf-8", errors="replace"); findings.extend(Scan_Content(content, Secrets_Patterns, str(env_file)))
Recommendation

Run it in a trusted workspace, treat raw reports as sensitive, and rotate any real secrets found in committed files.