Install
openclaw skills install skill-shieldSecurity audit tool for ClawHub skills. Scans a skill directory with 65 detection patterns, anti-obfuscation analysis, and dual rating system (Security + Compliance). v0.6.1 fixes batch scan performance by skipping venv/node_modules directories. Use when: installing a new skill, reviewing skill safety, or auditing permissions.
openclaw skills install skill-shieldScan any skill directory for permissions and dangerous patterns. Get a safety rating before you install.
Run the scanner on a skill directory:
python3 scripts/scan.py /path/to/skill-directory
python3 scripts/scan.py /path/to/skill-directory --sarif
The script prints two blocks to stdout:
--- JSON START --- and --- JSON END --- markers)--- MD START --- and --- MD END --- markers)python3 scripts/scan.py /path/to/skill-directory --output-dir /path/to/output
This creates report.json and report.md in the output directory.
| Grade | Meaning | Action |
|---|---|---|
| A | Safe | Install freely |
| B | Low risk | Minor concerns, generally safe |
| C | Needs review | Review flagged patterns before installing |
| D | High risk | Significant dangerous patterns detected |
| F | Dangerous | Do not install without thorough manual review |
Compares tools declared in SKILL.md against tools actually used in code. Reports:
Automatically decodes base64 and hex-encoded content, then re-scans decoded output for dangerous patterns. Obfuscated findings receive elevated severity.
Every detection pattern includes a CWE (Common Weakness Enumeration) reference for professional vulnerability classification.
Scan all skills in a directory at once with --batch:
python3 scripts/scan.py /path/to/skills/ --batch
python3 scripts/scan.py /path/to/skills/ --batch --json-summary
python3 scripts/scan.py /path/to/skills/ --batch --json-summary -o /path/to/output
--json-summary flag for machine consumptionbatch-summary.json when using -oUse --sarif flag to output SARIF 2.1.0 format, compatible with:
python3 scripts/scan.py /path/to/skill --sarif > report.sarif
python3 scripts/scan.py /path/to/skill --sarif -o /path/to/output
Regex patterns and string constants inside security tools (scanners, auditors) are no longer flagged as dangerous code. The scanner now recognizes when a pattern like rm -rf or curl POST appears inside a string literal (quotes, regex, array) and reduces severity accordingly.
Add # skill-shield: ignore-next-line above any line to suppress the next finding. Useful for known-safe patterns in security tools.
Based purely on dangerous code patterns found in executable files. Not affected by permission declarations.
Based on permission declaration completeness: does SKILL.md declare the tools actually used in code?
Combines both ratings into an actionable recommendation:
os.environ.get("KEY") / process.env.KEY reduced severity (standard practice)--disable-setuid-sandbox (browser flag) reduced severity| Code | Ratings | Meaning |
|---|---|---|
| 0 | A, B | Safe to install |
| 1 | C, D | Review recommended |
| 2 | F | Do not install |
Tips welcome: 0x6c730bDcfC762e23cE53aD991B75ab9852e87806 (Base)
Moltbook: https://www.moltbook.com/u/Yuqian
Twitter: @Yuqian0202