skill-guard

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches its security-scanning purpose, but its installer performs recursive file operations using an unvalidated skill name, which could affect files outside the intended skills folder.

Review or patch the shell script before relying on it. In particular, ensure it only accepts normal ClawHub slugs and cannot delete paths outside its staging or OpenClaw skills directory. Also consider pinning the mcp-scan version rather than running the latest package each time.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken or malicious skill name could cause the installer to delete or move files outside the intended OpenClaw skill folder.

Why it was flagged

The user-controlled skill slug is concatenated into recursive delete paths without validation or realpath containment checks. A slug containing path traversal such as '..' or '/' could target paths outside the staging or skills directory.

Skill content
SKILL_SLUG="$1" ... rm -rf "$STAGING_DIR/skills/$SKILL_SLUG" ... rm -rf "$SKILLS_DIR/$SKILL_SLUG"
Recommendation

Validate slugs against a strict registry-safe pattern, reject slashes and '..', use mktemp for staging, and verify resolved paths stay inside the intended directory before any rm, mv, or scan operation.

What this means

The scanner behavior or trustworthiness could change if the upstream package changes or is compromised.

Why it was flagged

The scanner is executed from an external package reference using '@latest', so the code run by the security gate can change between invocations. This is central to the skill's purpose, but it is not pinned.

Skill content
scan_output=$(uvx mcp-scan@latest --skills "$staged_path" 2>&1)
Recommendation

Pin mcp-scan to a reviewed version or lockfile, document the external dependency in metadata, and consider verifying package provenance.

NoteHigh Confidence
ASI01: Agent Goal Hijack
What this means

This does not look like an active attempt to override the agent, but users may see scanner warnings because the skill discusses prompt-injection examples.

Why it was flagged

Prompt-injection wording appears in the skill text as an explanatory example. In context this is expected for a scanner skill, but it explains the static prompt-injection signal.

Skill content
Prompt injections — hidden "ignore previous instructions" attacks
Recommendation

Keep examples clearly fenced or neutralized so security scanners and agents do not confuse them with executable instructions.