fail2ban Reporter

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: fail2ban-reporter Version: 1.0.0 This skill is designed to integrate with fail2ban to automatically report banned IPs to AbuseIPDB. It performs high-privilege operations, such as modifying fail2ban configuration files (`/etc/fail2ban/action.d/abuseipdb.conf`, `/etc/fail2ban/jail.local`) and restarting the fail2ban service, as seen in `scripts/install.sh` and `scripts/uninstall.sh`. It also makes external network calls to `api.abuseipdb.com` using `curl` to report and check IPs, as shown in `scripts/report-single.sh` and `scripts/check-ip.sh`. API keys are handled securely via environment variables or `pass`. All actions are clearly aligned with the stated purpose, require explicit user interaction (e.g., `sudo` for installation), and there is no evidence of malicious intent, unauthorized data exfiltration, or harmful prompt injection attempts in `SKILL.md` or `README.md`.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the reporting scripts or enabling auto-reporting will submit banned IP information to AbuseIPDB under the user's API key.

Why it was flagged

The script submits IP reports to AbuseIPDB using script-provided IP and comment values. This is the stated purpose, but it is still an external reporting action users should understand.

Skill content
"https://api.abuseipdb.com/api/v2/report" \
  -H "Key: $API_KEY" \
  --data-urlencode "ip=$IP"
Recommendation

Use it only on intended fail2ban jails, confirm the report categories and comments are appropriate, and review /var/log/abuseipdb-reports.log.

What this means

Reports will be made using the user's AbuseIPDB account authority.

Why it was flagged

The skill reads an AbuseIPDB credential from the environment or local password store. This is expected for the integration, but the registry metadata does not declare a primary credential.

Skill content
API_KEY="${ABUSEIPDB_KEY:-$(pass show abuseipdb/api-key 2>/dev/null || echo "")}"
Recommendation

Use a revocable AbuseIPDB key, store it securely, and monitor AbuseIPDB usage or rate-limit errors.

What this means

After installation, new fail2ban bans can trigger automatic AbuseIPDB reports without another manual command.

Why it was flagged

Installing creates a fail2ban action that persists and automatically runs report-single.sh on future bans. This is clearly aligned with the auto-reporting purpose and an uninstall script is included.

Skill content
cat > /etc/fail2ban/action.d/abuseipdb.conf << CONF
[Definition]
actionban = bash $SCRIPT_DIR/report-single.sh <ip> "SSH brute-force on <name> jail (fail2ban auto-report)"
Recommendation

Install only if continuous auto-reporting is desired, and use scripts/uninstall.sh to remove the fail2ban action when no longer needed.

What this means

Users may expect Telegram alerts that the provided code does not actually send.

Why it was flagged

The artifacts advertise Telegram notification, but the provided scripts do not contain Telegram token handling or Telegram API calls. This appears to be an unsupported feature claim rather than hidden behavior.

Skill content
Auto-report fail2ban banned IPs to AbuseIPDB and notify via Telegram... Sends Telegram notification (if configured)
Recommendation

Do not rely on Telegram notifications unless a reviewed Telegram implementation is added and configured.