Minduploadedcrab Skillguard

ReviewAudited by ClawScan on May 10, 2026.

Overview

Prompt-injection indicators were detected in the submitted artifacts (ignore-previous-instructions); human review is required before treating this skill as clean.

This skill looks reasonable as a local security scanner. Use it intentionally on skill directories, do not treat its results as a complete guarantee of safety, and avoid sharing raw scan output because it may include snippets from files containing secrets. ClawScan detected prompt-injection indicators (ignore-previous-instructions), so this skill requires review even though the model response was benign.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running scan-all lets the tool inspect all installed OpenClaw skill files on the local machine.

Why it was flagged

The scanner can recursively enumerate installed skill files. This is aligned with its security-scanning purpose, but it is broader than inspecting one selected file.

Skill content
SKILLS_DIR = Path.home() / ".openclaw" / "workspace" / "skills" ... for root, dirs, filenames in os.walk(skill_path):
Recommendation

Run it only against skill directories you intend to inspect, and review scan results before acting on them.

What this means

The tool does not appear to transmit secrets, but its terminal or JSON output could reveal sensitive values if copied or shared.

Why it was flagged

Findings can include up to 200 characters of the line that matched a credential/path pattern, so scan output may contain secret-like snippets if scanned files contain secrets.

Skill content
message=f"Accesses sensitive path/variable: {cp}" ... evidence=line.strip()[:200]
Recommendation

Treat scan output as sensitive, especially JSON reports, and redact credential-looking values before sharing results.