Install
openclaw skills install security-checkerSecurity scanner for Python skills before publishing to ClawHub. Use before publishing any skill to check for dangerous imports, hardcoded secrets, unsafe file operations, and dangerous functions like eval/exec/subprocess. Essential for maintaining trust and ensuring published skills are safe for others to install and run.
openclaw skills install security-checkerSecurity scan Python skills before publishing to ensure code safety.
security_scan.py <file_or_directory>
Examples:
# Scan a single Python file
security_scan.py scripts/my_script.py
# Scan an entire skill directory
security_scan.py /path/to/skill-folder
# Scan multiple skills
security_scan.py skills/
Detects imports that could be used maliciously:
os - System-level operationssubprocess - Command executionshutil - File operationssocket - Network operationsurllib / requests - HTTP requestsWhy dangerous? These imports enable system command execution, file manipulation, and network access that could be exploited.
Detects potentially unsafe function calls:
os.system() - Executes shell commandssubprocess.call(), subprocess.run(), subprocess.Popen() - Command executioneval() - Executes arbitrary codeexec() - Executes arbitrary codeWhy dangerous? These can execute arbitrary commands or code, leading to remote code execution vulnerabilities.
Detects tokens, keys, and passwords:
Why dangerous? Secrets leaked in published code can be stolen and abused.
Detects risky file access patterns:
..)Why dangerous? Could lead to unintended file access, data loss, or system modification.
Before publishing any skill:
# 1. Run security scan
security_scan.py /path/to/skill
# 2. Review any warnings
# If warnings appear, fix the code or document why it's safe
# 3. Re-scan after fixes
security_scan.py /path/to/skill
# 4. Only publish if scan passes
clawhub publish /path/to/skill --slug my-skill ...
Code appears safe. Proceed with publishing.
Potentially risky pattern detected. Review the specific line and decide:
Secret detected. Before publishing:
os.getenv('API_KEY')import os # Used only for path.join() - safe file path construction
workspace = os.path.join(os.path.expanduser("~"), ".openclaw", "workspace")
Scan result: ⚠️ Warning about os import Action: Document safe usage pattern in code comments
API_KEY = "sk-1234567890abcdef" # DON'T DO THIS
Scan result: 🔴 Possible hardcoded secret Action: Remove and use environment variable:
API_KEY = os.getenv("MY_SKILL_API_KEY")
# Document in SKILL.md: Requires MY_SKILL_API_KEY environment variable
# JSON storage for local data only
data = {"notes": [], "metadata": {}}
with open("data.json", "w") as f:
json.dump(data, f)
Scan result: ✅ No issues
# Pre-commit hook concept
python3 /path/to/security_scan.py scripts/
if [ $? -ne 0 ]; then
echo "❌ Security scan failed. Fix issues before committing."
exit 1
fi
#!/bin/bash
# publish-safe.sh
SKILL_PATH=$1
echo "🔒 Running security scan..."
python3 /path/to/security_scan.py "$SKILL_PATH"
if [ $? -ne 0 ]; then
echo "❌ Cannot publish: Security scan failed"
exit 1
fi
echo "✅ Security scan passed"
clawhub publish "$SKILL_PATH"
This scanner:
Complement with:
bandit, safetyPublishing skills that pass security scans builds trust in the community:
# research-assistant
security_scan.py /home/ubuntu/.openclaw/workspace/skills/research-assistant
# ✅ All clear
# task-runner
security_scan.py /home/ubuntu/.openclaw/workspace/skills/task-runner
# ✅ All clear
# security-checker
security_scan.py /home/ubuntu/.openclaw/workspace/skills/security-checker
# ✅ All clear
All three skills passed security scans before publishing to ClawHub.