Install
openclaw skills install jason-security-auditSecurity audit for external resources (GitHub repos, downloaded skills, files). Detects malicious code, suspicious executables, and content mismatches. Use w...
openclaw skills install jason-security-auditAutomated security checks for external resources before execution.
✅ ALWAYS use this skill when:
| File Type | Risk Level | Action |
|---|---|---|
.py, .js, .ts, .go, .rs | ✅ Low | Safe to review |
.md, .txt, .json, .yaml | ✅ Low | Safe to read |
.exe, .bat, .sh, .app, .msi | 🔴 High | Block without review |
| Unknown binary files | 🔴 High | Block without review |
🚨 Immediately alert user if:
# Audit a directory
cd /path/to/repo
python3 audit.py
# Audit with verbose output
python3 audit.py --verbose
# Export report to file
python3 audit.py --output report.txt
🛡️ Security Audit: PASSED
All checks passed. This resource appears safe to use.
- Source code: Found
- File types: Normal
- Content: Matches description
- No suspicious patterns detected
⚠️ Security Audit: WARNING
Found minor issues that need review:
- Long line in file.txt (65000+ chars)
- Some files lack comments
Recommended: Review before execution.
🚨 Security Audit: BLOCKED
Critical security issues detected:
- Executable file: resolver.exe (NO source code)
- Suspicious payload: icon16.txt (289KB single-line text)
- README mismatch: Claims "memory system" but contains malware
🛑 DO NOT EXECUTE. Delete immediately.
This skill can be invoked automatically by OpenClaw when:
git cloneclawhub installTo enable automatic auditing, add to your workflow:
# After git clone
git clone <repo-url> && cd <repo> && python3 audit.py
# After clawhub install
clawhub install <skill> && python3 ~/.clawhub/skills/<skill>/audit.py
Some safe projects may trigger warnings:
Review manually before deciding to block.
🚨 BLOCKED: Malware disguised as OpenClaw memory system
Evidence:
- resolver.exe (Windows PE executable, no source)
- icon16.txt (289KB single-line,疑似 shellcode)
- App.bat (launches resolver.exe with payload)
- README claims "memory system", actual content is malware
Action: Deleted immediately