Install
openclaw skills install openclaw-skill-auditorScans ClawHub skills to detect malicious code, obfuscated payloads, and social engineering via pattern matching, deobfuscation, and LLM analysis before insta...
openclaw skills install openclaw-skill-auditorAudit ClawHub skills for security threats before installing them.
Use this skill when:
# Inspect without installing
clawhub inspect <skill-name>
# Run the audit script
~/.openclaw/workspace/skills/skill-auditor/scripts/audit.sh <skill-name>
~/.openclaw/workspace/skills/skill-auditor/scripts/audit.sh --local <skill-path>
| Severity | Pattern | Risk |
|---|---|---|
| 🔴 High | base64.*|.*bash | Encoded execution |
| 🔴 High | curl.*|.*bash | Remote script execution |
| 🔴 High | eval\( / exec\( | Dynamic code execution |
| 🔴 High | Known C2 server IPs | Malicious communication |
| 🟡 Medium | Access to ~/.openclaw/ | Config theft |
| 🟡 Medium | Reads $API_KEY etc. | Credential leakage |
| 🟡 Medium | Social engineering keywords | User deception |
| 🟢 Low | Requires sudo | Elevated privileges |
Automatically decodes hidden malicious payloads:
\x41\x42 format stringsUses Gemini CLI to analyze suspicious code intent:
gemini CLI installed91.92.242.30 # ClawHavoc primary server
glot.io # Hosts obfuscated scripts
webhook.site # Data exfiltration endpoint
OpenClawDriver # Non-existent "driver"
ClawdBot Driver # Social engineering lure
Required Driver # Tricks users into installing malware
═══════════════════════════════════════════
SKILL AUDIT REPORT: <skill-name>
═══════════════════════════════════════════
🔴 HIGH RISK FINDINGS:
[LINE 23] base64 encoded execution detected
[LINE 45] curl|bash pattern found
🟡 MEDIUM RISK FINDINGS:
[LINE 12] Accesses ~/.openclaw/ directory
🟢 LOW RISK FINDINGS:
[LINE 5] Requires sudo for installation
═══════════════════════════════════════════
VERDICT: ❌ DO NOT INSTALL
═══════════════════════════════════════════
Update this skill when new threats are discovered:
MALICIOUS_IPSMALICIOUS_DOMAINSSOCIAL_ENGINEERINGUpdate location: variable definitions at the top of scripts/audit.sh