Agent Skills Tools

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: agent-skills-tools Version: 0.1.0 This skill is designed as a security audit tool for other OpenClaw skill packages. The `skill-security-audit.sh` script uses standard command-line tools (`find`, `grep`, `git log`) to analyze the contents and Git history of a target skill directory for common vulnerabilities like hardcoded credentials, dangerous file access patterns, and network requests. All operations are read-only and confined to the specified target directory. There is no evidence of data exfiltration, malicious execution, persistence mechanisms, or prompt injection attempts against the agent in SKILL.md that would deviate from its stated purpose.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent or user points it at a broad private directory instead of a skill package, file paths and matching lines from more local files could be shown in the audit output.

Why it was flagged

The scanner recursively inspects a user-supplied or default current directory and can inspect Git history; this is intended for auditing skills, but scope depends entirely on the path used.

Skill content
SKILL_DIR="${1:-.}" ... find "$SKILL_DIR" ... git -C "$SKILL_DIR" log --all -S "api_key"
Recommendation

Run it only on the specific skill package you intend to audit, and avoid using home directories or unrelated project roots as the target.

What this means

Real secrets in a scanned package could become visible in the agent transcript or logs while reviewing the audit results.

Why it was flagged

When the audit finds credential-like strings, it prints matching lines to the output instead of redacting the secret value.

Skill content
CREDENTIAL_LEAKS=$(find "$SKILL_DIR" ... grep ...); ... echo "$CREDENTIAL_LEAKS"
Recommendation

Treat audit output as sensitive; redact matched values before sharing, or modify the scanner to mask secret values by default.

What this means

Users have less publisher/project context to rely on and should base trust on reviewing the included files.

Why it was flagged

The package has limited external provenance information, although the included script is small and fully visible in the provided artifacts.

Skill content
Source: unknown; Homepage: none; Install specifications: No install spec — this is an instruction-only skill.
Recommendation

Review the visible script before running it and prefer verified publisher/source links when available.