Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Axioma Guard

v1.0.0

Système immunitaire numérique pour agents autonomes. Détecte les "ombres" malveillantes via Clawdex (par Koi), génère des vaccins éthiques, et protège la com...

0· 44·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description (Clawdex checks + vaccine generation) align with what the code does: it queries a Clawdex API and posts threat data to a Merlin API to produce a 'vaccine'. Required binaries (curl, python3) and module (aiohttp) are appropriate. Minor inconsistency: SKILL.md metadata does not declare the optional environment variables the code reads (CLAWDEX_API, MERLIN_API), though those are not required for basic operation.
Instruction Scope
Runtime instructions and code scope are mostly consistent: the SKILL.md shows curl calls to Clawdex and usage examples that match clawguard.py. The code scans a local ./skills directory (lists directories and queries Clawdex per skill) — this is reasonable for a skill scanner but does access the local filesystem to enumerate installed skills. The skill does make external network calls to CLAWDEX_API and MERLIN_API; those are expected for its purpose but increase exposure.
Install Mechanism
No install spec (instruction-only) and the included Python script runs without an installer. This is lower-risk than arbitrary downloads or binary installs. The package does require aiohttp (Python dependency), but there is no automated install step that pulls remote archives from untrusted URLs.
Credentials
The skill declares no required credentials, which matches the code (it does not request tokens). However, clawguard.py reads optional env vars CLAWDEX_API and MERLIN_API (defaults: https://clawdex.koi.security/api/skill and http://localhost:8001). These are not secrets, but they let the skill contact external services; SKILL.md did not list them explicitly. No high-privilege secrets are requested.
Persistence & Privilege
always is false and the skill does not request permanent platform privileges or modify other skills' configs. It can be invoked autonomously (default), which is normal for skills; combine this with external-network access only if you distrust the endpoints.
Scan Findings in Context
[unicode-control-chars] unexpected: The SKILL.md triggered a 'unicode-control-chars' prompt-injection signal. While the file is human-readable, control/unicode characters can be used to obfuscate content or influence parsers. This is not necessary for the skill's functionality and is suspicious; review the raw file for hidden characters before trusting.
What to consider before installing
What to consider before installing: - Source trust: The package has no homepage and an unknown owner. That increases risk—prefer skills from known authors or repositories. - External endpoints: The code contacts two endpoints: a default Clawdex at https://clawdex.koi.security/api/skill and a Merlin API at http://localhost:8001 (overridable via CLAWDEX_API and MERLIN_API env vars). If an attacker changes MERLIN_API to a remote host or if the default clawdex domain is malicious, the agent will send threat data to external services. Verify and restrict these endpoints before use. - Prompt-injection artifact: The SKILL.md contains unicode control character signals flagged by the scanner. Inspect the raw SKILL.md and remove/understand any hidden characters; they are unnecessary for normal operation. - Local filesystem access: The script enumerates ./skills (lists directories) to check installed skills. This is expected behavior for a scanner, but be aware it reads directory names and makes outbound requests per entry. - Mitigations if you still want to try it: - Run in an isolated environment (container or VM) with restricted network egress. - Set CLAWDEX_API to a trusted, reviewed endpoint and set MERLIN_API to a local/controlled service; avoid pointing MERLIN_API to unknown remote servers. - Review and run the Python source (clawguard.py) manually to verify behavior; check for hidden characters and unexpected code paths. - Avoid granting any credentials to the skill; it doesn't require tokens but be careful if you alter it to add auth. Given the unknown provenance and the prompt-injection signal, do not install this skill on production or highly-trusted agents until you have verified its code and endpoints. If you can confirm the Clawdex domain and author reputation, and run it in a sandbox with network controls, the functionality itself is coherent with its description.

Like a lobster shell, security has layers — review code before you run it.

latestvk973wyks6676b2ndb8hywrt3ws83hwvs

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Binscurl, python3

Comments