Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Li Base Scan
v0.0.2Linux base security scanner integrating multiple tools - nmap, lynis, nikto, sqlmap, trivy. SINGLE HOST ONLY. Features secure temp files, progress bar, scan...
⭐ 0· 81·0 current·0 all-time
byTerry S Fisher@43622283
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description match the code and README: the package contains orchestrator scripts (li_base_scan.py, entrypoint.py), an HTML reporter, and an LLM interaction layer, and references the expected tools (nmap, lynis, nikto, sqlmap, trivy). The inclusion of 'stealth' and SQL injection modes is consistent with the stated functionality.
Instruction Scope
Runtime instructions and code are focused on scanning a single host, producing reports, and saving history. The skill enforces single-host validation and uses secure temporary files and timeout handling. Note: documentation and code reference saving history/reports under /root/.openclaw/... while log files use Path.home() — this mismatch may cause permission issues or unexpected write locations if not run as root.
Install Mechanism
There is no automatic install spec in the registry; the SKILL.md suggests installing external tools manually (apt-get and a curl | sh call for Trivy). Because nothing is auto-downloaded by the skill manifest itself, install risk from the registry is low — but the recommended curl | sh command in docs is higher risk if executed blindly by a user.
Credentials
The registry metadata declares no required env vars, but the README and docs mention LLM_API_KEY and LLM_API_URL for optional LLM analysis. The codebase includes an LLM interface file but does not directly show an LLM API call or env-var use in the provided snippets; this is an inconsistency to be aware of (docs promise LLM integration and an API key, but the code doesn't appear to require or use credentials).
Persistence & Privilege
always:false (normal). The skill writes reports and a history DB to disk (history.db at /root/.openclaw/skills/li-base-scan/history.db and reports under /root/.openclaw/skills/li-base-scan/reports/ per docs). Storing history/reports locally is expected for this tool, but the use of absolute root paths is unusual and may require root privileges or fail silently — review and adjust paths before running as a non-root user.
Assessment
This skill is internally consistent with its stated purpose (a single-host security scanner) but review a few items before installing or running it:
- Authorization: Only scan systems you own or have explicit permission to test. The skill includes destructive/active tests (sqlmap, nikto) and a 'stealth' mode intended to evade detection — both increase legal/operational risk if used without authorization.
- Tools & installs: The SKILL.md recommends installing nmap/nikto/sqlmap/lynis and running a curl | sh for trivy. Do not blindly run curl | sh from docs; prefer installing Trivy from a trusted package or GitHub release and review the install script first.
- Paths & privileges: The code stores history and reports under /root/.openclaw/... while logs go under the current user's home. This mismatch may require root to work as documented or may fail to write history. Inspect and, if needed, change DB/report paths to a location appropriate for your environment before running.
- LLM integration: The README references LLM_API_KEY/LLM_API_URL, but the provided code does not clearly show outbound LLM API calls. If you plan to enable LLM analysis, search the code for any external network calls and check how/where you must provide credentials; do not provide secret keys until you verify the integration code.
- Review the code: Because this skill runs subprocesses of external scanning tools, audit the scripts (li_base_scan.py, entrypoint.py, llm_scanner.py, html_reporter.py) yourself for any unexpected network calls, hidden endpoints, or data exfil logic before running it in a sensitive environment.
- Run in a controlled environment first: Test on an isolated VM or container to confirm behavior, output locations, and permission handling. If you want to keep history, change the DB/report directories to a non-root path.
If you need, I can point out the exact lines where the DB path and trivy install command are referenced, or search the code for any locations that call external URLs.Like a lobster shell, security has layers — review code before you run it.
latestvk971aypx51epws4f28xjqgk2r183e79kniktovk971aypx51epws4f28xjqgk2r183e79knmapvk971aypx51epws4f28xjqgk2r183e79kscanningvk971aypx51epws4f28xjqgk2r183e79ksecurityvk971aypx51epws4f28xjqgk2r183e79k
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
