Install
openclaw skills install friskPre-install security audit and vulnerability scanner for ClawHub skills -- scan by slug or local path, 9 threat intel sources, 7 checks including malware scanning, dependency vulnerabilities, and credential leak detection.
openclaw skills install friskSecurity verification for ClawHub skills. Scan any skill — by local path or ClawHub slug — against 9 continuously-updated threat intelligence sources using 7 autonomous security checks.
Frisk scans a skill directory for security issues before you install it. It checks dependencies against known vulnerability databases, scans for hardcoded secrets, detects indicators of compromise, and looks for prompt injection vectors — all without sending your data anywhere.
One command to scan any ClawHub skill:
frisk scan weather-forecast
That downloads the skill from ClawHub, scans it, shows results, and cleans up. No manual steps.
Or scan a local skill directory:
frisk scan ./my-skill
Use Frisk when you are about to install a skill from ClawHub and want to verify it is safe. Also use it when developing your own skills — run a scan before publishing to catch issues early.
weather-forecast). If a slug is provided, the skill is downloaded temporarily, scanned, and removed.dep-scan, static-analysis, secret-scan, yara-scan, ioc-match, behavioral, prompt-inject. Default: all 7.Frisk outputs a structured report with:
pass, warn, or failcritical, high, medium), description, and file locationfrisk report <id>Exit codes: 0 = pass, 1 = warn, 2 = fail
| Check | What it does |
|---|---|
| dep-scan | Cross-references dependencies against CISA KEV and OSV databases |
| static-analysis | Runs Semgrep rules for security anti-patterns |
| secret-scan | Scans for hardcoded API keys, tokens, and credentials using Gitleaks |
| yara-scan | Matches files against YARA rules for malware patterns |
| ioc-match | Matches IPs, domains, URLs, and file hashes against ThreatFox, URLhaus, MalwareBazaar, and Feodo trackers |
| behavioral | Detects suspicious patterns: eval usage, shell injection, data exfiltration vectors, DNS tunneling |
| prompt-inject | Detects prompt injection and instruction-hiding patterns in SKILL.md |
CISA KEV · OSV (npm + PyPI) · EPSS · MalwareBazaar · URLhaus · ThreatFox · Feodo Tracker · YARA Rules · Semgrep Rules
Run frisk sync to refresh the intel cache.
Frisk downloads threat intel feeds from these public sources during frisk sync:
| Source | URL | Data sent |
|---|---|---|
| CISA KEV | https://www.cisa.gov/sites/default/files/feeds/ | None (GET only) |
| OSV | https://api.osv.dev/v1/query | Package name + version for dependency lookup |
| EPSS | https://epss.cyentia.com/api/v1/ | None (GET only) |
| MalwareBazaar | https://mb-api.abuse.ch/api/v1/ | None (POST for hash lookup) |
| URLhaus | https://urlhaus-api.abuse.ch/v1/urls/ | None (GET only) |
| ThreatFox | https://threatfox-api.abuse.ch/api/v1/ | None (POST for IOC lookup) |
| Feodo Tracker | https://feodotracker.abuse.ch/downloads/ | None (GET only) |
| YARA Rules | https://github.com/Yara-Rules/rules.git | None (git clone) |
| Semgrep Rules | https://github.com/returntocorp/semgrep-rules.git | None (git clone) |
During frisk scan, no network requests are made. All intel is local.
~/.frisk/intel/ — Threat intel cache~/.frisk/intel/ — Synced threat intel data~/.frisk/reports/ — Scan reports (JSON)~/.frisk/venv/ — Python virtual environment for scan checks~/.frisk/frisk.log — Scan log outputBy using Frisk, you trust the threat intel sources listed above to provide accurate vulnerability and IOC data. No skill code or scan targets are transmitted to any external service. Install it only if you trust the Low Watt Labs project and the listed intel sources.
npm install -g @lowwattlabs/frisk
First run automatically creates a Python venv and syncs threat intel. After that, frisk scan works with zero configuration.
MIT-0 — same as all ClawHub skills.