Install
openclaw skills install capability-graph-mapperHelps map the composite permission surface across AI agent skill dependency chains. Traces what each skill can do individually, then computes what they can d...
openclaw skills install capability-graph-mapperHelps map composite permission surfaces across skill dependency chains, revealing emergent capabilities that no single skill declares.
Individual skill permissions look reasonable in isolation. A file-reader skill reads files. An HTTP client skill sends requests. A JSON parser skill transforms data. Each one passes a security review on its own.
But install all three in the same agent, and you've built a data exfiltration pipeline — read sensitive files, parse out credentials, send them to an external endpoint. Nobody approved that combination. Nobody even noticed it exists.
In traditional software, tools like npm audit map dependency trees and flag known vulnerabilities. In agent ecosystems, the risk isn't in individual dependencies — it's in the composite capability surface that emerges when skills combine. There is no npm audit for emergent agent capabilities.
This mapper traces the permission graph across an agent's installed skills:
Input: Provide one of:
Output: A capability graph report containing:
Input: Map capability surface for agent with skills: log-analyzer, http-poster, env-reader, markdown-formatter
🕸️ CAPABILITY GRAPH — 3 emergent risks detected
Permission matrix:
read_files send_http read_env exec_shell write_files
log-analyzer ✓
http-poster ✓
env-reader ✓ ✓
markdown-formatter ✓ ✓
Emergent capability combinations:
⚠️ RISK 1: Data exfiltration path
env-reader (read .env) → http-poster (send HTTP)
Combined: Can read credentials and transmit them externally
Severity: HIGH
⚠️ RISK 2: Sensitive file relay
log-analyzer (read logs) → http-poster (send HTTP)
Combined: Can read application logs and send contents externally
Severity: MODERATE
⚠️ RISK 3: Three-hop chain
env-reader (read secrets) → markdown-formatter (transform data)
→ http-poster (send HTTP)
Combined: Read, obfuscate, and exfiltrate in one pipeline
Severity: HIGH
Privilege surface score: 67/100 (elevated)
Recommendation:
- Review whether http-poster needs to coexist with env-reader
- Consider sandboxing env-reader's file access scope
- The markdown-formatter → http-poster chain enables obfuscation;
audit what markdown-formatter can output
Capability graph mapping depends on accurately extracting each skill's actual permissions, which may not always match declared permissions. Skills that dynamically request capabilities at runtime may not be fully captured through static analysis. The composition risk model uses known dangerous patterns (read+send, parse+execute) but novel attack chains may not be in the pattern library. This tool helps surface emergent risks for human review — it does not guarantee detection of all possible capability combinations. Privilege surface scores are relative, not absolute measures of risk.