Back to skill
Skillv0.1.3
ClawScan security
NxtSecure-openclaw · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignMar 15, 2026, 2:22 AM
- Verdict
- Benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill is internally consistent with its stated purpose (nightly Linux host security audit and remediation) but performs privileged system changes and installs a persistent cron job — review configuration and defaults before enabling on production systems.
- Guidance
- This skill appears to do what it says, but it modifies system state and can remediate automatically. Before installing or enabling: 1) Inspect the bundled scripts yourself and test them on a non-production host. 2) Backup SSH config and ensure you have an alternate access method (console or recovery) in case of lockout. 3) Consider setting AUTO_REMEDIATE=0 in the config to run in report-only mode, then enable remediation after manual review. 4) Note the cron installer will add a persistent nightly job; run it only on hosts you want scheduled audits on. 5) The SKILL.md suggests installing an external npm package — if you follow that step, verify the upstream package (publisher, version) before running. 6) VirusTotal uploads are disabled by default; the script will prepare browser-based workflows and only uploads if you explicitly enable/approve it. 7) If you need higher assurance, run the audit scripts manually once and review their output/logs before installing the cron.
Review Dimensions
- Purpose & Capability
- okThe name/description (OpenClaw host security audit, nightly 23:00 run) match the delivered assets: a main audit script, a cron installer, and a VirusTotal helper. The checks implemented (firewall, fail2ban, SSH hardening, listening ports, Docker review, disk, failed logins, automatic updates, VirusTotal browser workflow) are expected for this purpose.
- Instruction Scope
- noteThe SKILL.md and bundled scripts instruct the agent to perform privileged changes: enable services, modify SSH configuration (disable password auth, add drop-in files), and potentially enable firewall rules. These actions are coherent for a remediation tool but are powerful. The skill attempts automatic remediation by default (AUTO_REMEDIATE=1) and will disable SSH password auth automatically if allowed — the README includes safety guidance (check new port, open firewall, test a second session) which mitigates lockout risk, but the automatic remediation default can still surprise an operator who expects only reporting.
- Install Mechanism
- noteThere is no install spec in the registry bundle (instruction-only plus local scripts). The SKILL.md suggests an npm package (npm install -g nxtsecure-openclaw) as a preferred CLI, but the repository includes functional local scripts as fallbacks. Installing the npm package would fetch external code not included here; the bundled scripts themselves do not download remote archives and are inspectable.
- Credentials
- noteNo secrets or unrelated credentials are requested. The scripts read system configuration files (ssh config, systemctl, firewall, Docker state) and accept a few optional env vars (OPENCLAW_AUDIT_CONFIG, OPENCLAW_AUDIT_LOG, VIRUSTOTAL_ALLOW_UPLOADS). These are proportional to a host audit but require elevated privileges to act, which is expected but sensitive.
- Persistence & Privilege
- noteThe installer script writes a crontab entry to schedule the audit nightly at 23:00; this is persistent and, if run as root, will execute privileged work each night. The skill is not force-enabled (always:false). Autonomous model invocation is allowed by default (normal), but persistent scheduled execution is a real operational effect the user should explicitly approve.
