Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Ai Security Audit
v0.1.0Perform a security audit on exposed AI service endpoints using OpenClaw threat intelligence. Trigger when the user says "security audit", "audit my AI servic...
⭐ 0· 249·1 current·1 all-time
by@leek-w
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description claim an audit using the OpenClaw threat intelligence dataset; the SKILL.md contains appropriate questions to ask the user and sensible audit/hardening steps. However, the skill never declares or documents how to access the OpenClaw database (no API URL, API key, SDK, or instructions). That mismatch between claimed data-source and required access is a notable omission.
Instruction Scope
The runtime instructions focus on collecting endpoint metadata, checking exposures, mapping risk fields, and producing a report. Commands suggested (curl to get public IP, grep to search config files, firewall commands) are relevant to the audit. The instructions do not ask for unrelated credentials or system-wide secrets. They do, however, instruct running file searches and shell commands that could reveal secrets if executed — which is expected for an audit but requires explicit user consent.
Install Mechanism
This is an instruction-only skill with no install spec and no code files; nothing will be written to disk by the skill itself. That minimizes install-time risk.
Credentials
The skill declares no required environment variables, binaries, or credentials. The remediation steps show how to set env vars locally (e.g., WEBUI_SECRET_KEY) and suggest searching local config files for secrets. Because no external API key or OpenClaw credential is requested, the lack of declared credentials is the main proportionality concern (see purpose_capability).
Persistence & Privilege
always is false and the skill does not request persistence or system-level privileges. Autonomous invocation is allowed by platform default but there are no signals of privileged or persistent changes initiated by the skill itself.
What to consider before installing
This skill appears to be a legitimate audit playbook, but it references an external 'OpenClaw' threat-intel database without explaining how it will query that data. Before installing or running it, ask the skill author: (1) How does the skill access OpenClaw (API endpoint, auth method, or is the data embedded)? (2) Will the agent make network calls to external services, and if so, which hosts and what data will be sent? (3) Will the agent execute shell commands on your machine or require you to paste sensitive config files or credentials? If you proceed, avoid pasting raw secrets; provide sanitized examples or run the audit commands yourself in a controlled environment. Prefer a version that documents the OpenClaw API endpoint and required credentials, or that runs entirely offline with user-provided data so you can verify any external network activity.Like a lobster shell, security has layers — review code before you run it.
latestvk970101mtx5ywsep7g4kyc7xb182jte9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
