Searxng 1
PassAudited by VirusTotal on May 12, 2026.
Overview
Type: OpenClaw Skill Name: searxng-1 Version: 1.0.1 The skill is classified as suspicious due to the combination of a user-configurable `SEARXNG_URL` environment variable and the `verify=False` setting in the `httpx.get` request within `scripts/searxng.py`. While intended for local SearXNG instances with self-signed certificates, this creates a significant Server-Side Request Forgery (SSRF) and Man-in-the-Middle (MITM) vulnerability if an attacker can control the `SEARXNG_URL` environment variable. The skill itself does not exhibit malicious intent, but these design choices introduce high-risk capabilities that could be exploited.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If you use a public or untrusted SearXNG instance, your search terms could be visible to that service or exposed to network interception.
Search queries are sent to the configured SearXNG endpoint, and TLS certificate verification is disabled. This is disclosed for local self-signed instances, but it reduces protection if the URL is remote or untrusted.
response = httpx.get(
f"{SEARXNG_URL}/search",
params=params,
timeout=30,
verify=FalseUse a trusted local SearXNG instance when possible, and consider enabling certificate verification for remote HTTPS instances.
Running the skill may install or use current versions of its Python dependencies, which can affect reproducibility.
The script declares runtime Python package dependencies without version pins. These packages are expected for HTTP requests and rich CLI output, but users should be aware of runtime dependency resolution.
# /// script # requires-python = ">=3.11" # dependencies = ["httpx", "rich"] # ///
If reproducibility matters, pin or lock dependency versions in your local setup and install packages from trusted indexes.
