Clawd Modifier

PassAudited by VirusTotal on May 13, 2026.

Overview

Type: OpenClaw Skill Name: clawd-modifier Version: 1.0.0 This skill is classified as suspicious due to its use of high-risk capabilities, specifically the direct modification of system-level files and a compiled binary. The scripts (`patch_art.py`, `patch_color.py`) modify the `cli.js` file, and `patch_binary.py` performs byte-level patching on the `claude` executable. While the stated purpose is benign (customizing a mascot's appearance), these actions involve powerful system modification techniques that carry inherent risks, even with included safeguards like backups and dry-run options. There is no clear evidence of malicious intent such as data exfiltration or persistence.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A cosmetic request could modify the trusted Claude Code executable itself; if a pattern match is wrong or the version differs, the CLI may behave unexpectedly or break.

Why it was flagged

The helper can locate a Claude executable in common install paths, perform broad byte-sequence replacement, and write the modified binary back to disk.

Skill content
DEFAULT_PATHS = [Path.home() / ".local/bin/claude", "/usr/local/bin/claude", "/opt/homebrew/bin/claude"] ... data = data.replace(search, replace) ... binary_path.write_bytes(data)
Recommendation

Use only with an explicit user request, run dry-run/list modes first, keep backups enabled, verify the targeted Claude Code path and version, and prefer scoped configuration if available.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Mascot changes can affect future Claude Code sessions, not just the current request.

Why it was flagged

The documentation acknowledges that modifications persist in the installed CLI until an update or restore operation reverses them.

Skill content
Changes are overwritten by `npm update` ... `python scripts/patch_art.py --restore`
Recommendation

Treat changes as persistent local modifications; keep backups, document what was changed, and restore before troubleshooting Claude Code issues.

What this means

Users have less external context for deciding whether to trust the patching scripts.

Why it was flagged

The registry information provides limited provenance for scripts that patch a core developer tool.

Skill content
Source: unknown; Homepage: none
Recommendation

Inspect the scripts locally before use and avoid running them on important Claude Code installations unless you trust the skill source.