Moltbook Firewall
v0.1.0Security layer protecting agents from prompt injection, social engineering, and malicious content on Moltbook and similar platforms. Scan content before processing, detect threats, block attacks.
⭐ 1· 1.6k·0 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name, description, patterns file, and scanner script are aligned: the skill detects prompt injection, code execution, social engineering, and data-exfiltration patterns. It does not request unrelated credentials or unusual system access.
Instruction Scope
Runtime instructions are confined to scanning content and making accept/flag/block decisions. However, the SKILL.md references files/scripts that are not present in the package (patterns/trusted-sources.json and scripts/add-pattern.sh). In the included patterns file the whitelist exists under trusted_domains, so the SKILL.md's reference is a mismatch (likely a documentation bug).
Install Mechanism
There is no install spec and no external downloads; the skill is instruction-only plus a local bash scanner. No high-risk install behavior (no arbitrary remote code fetch) was found.
Credentials
The skill declares no required credentials or env vars, which is proportionate. The scanner writes logs to $HOME/.openclaw/workspace/data/firewall-log.jsonl and uses jq at runtime (jq is not declared in required binaries). Ensure jq is available and be aware that scanned content (up to 500 chars) is persisted to a log file under the user's home directory — this can leak sensitive snippets if not protected.
Persistence & Privilege
always:false and user-invocable:true (defaults) — no forced always-on behavior. The scanner persists logs to a file in the workspace, but it does not modify other skills or system-wide settings. Review and control access to the log path if sensitive content may be scanned.
Scan Findings in Context
[ignore-previous-instructions] expected: The pre-scan detector flagged a prompt-injection phrase that appears inside SKILL.md as an explicit example of prompt-injection attacks. In this context the occurrence is expected and not evidence of malicious intent.
Assessment
This skill appears to do what it claims (pattern-based scanning) and does not request credentials or install remote code, but inspect and take a few precautions before installing: (1) Confirm jq is available on hosts that will run the script (the script uses jq but the manifest doesn't declare it). (2) Note that scan results (a 500-character preview of content and threat metadata) are appended to $HOME/.openclaw/workspace/data/firewall-log.jsonl — if you will scan sensitive content, restrict access to that log or change the path. (3) SKILL.md mentions scripts/add-pattern.sh and patterns/trusted-sources.json which are not present; if you need pattern-update tooling, edit patterns/threats.json directly or add your own management script. (4) Review patterns/threats.json to ensure its regexes match your threat model and do not generate unacceptable false positives/negatives. If any of the above are unacceptable or you cannot control log file access, treat the skill cautiously.Like a lobster shell, security has layers — review code before you run it.
latestvk97f9mxmdthdz44etxgfkwr1a580cev2
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
