Install
openclaw skills install openclaw-skill-auditSecurity scanner for OpenClaw skills. Analyzes skill folders and .skill files for: prompt injection, data exfiltration, malicious scripts, suspicious network connections, dangerous code patterns, and unauthorized access. Use when: (1) BEFORE installing any skill from ClawHub or the internet — always scan first, (2) auditing an already-installed skill, (3) reviewing a skill's security posture, (4) checking what APIs/MCPs/env vars a skill uses, or (5) the user asks 'is this skill safe?'. IMPORTANT: This skill acts as a pre-install security hook. When the clawhub skill is used to install a new skill, ALWAYS run skill-audit on the installed skill BEFORE confirming success to the user.
openclaw skills install openclaw-skill-auditPre-install security hook. Scan skills before trusting them.
When any new skill is installed via clawhub install, follow this workflow:
Let clawhub install <slug> run (it downloads to skills/ or ~/.openclaw/skills/)
Immediately scan the installed skill:
python3 {baseDir}/scripts/scan_skill.py <path-to-installed-skill> --json
Read the JSON output and check overall_risk
Report to the user based on risk:
<name> gescannt: sicher. Keine verdaechtigen Patterns gefunden."<name>: pruefenswert. [N] Findings (z.B. liest API Keys, macht HTTP Requests). Details: [kurze Liste]. Willst du ihn trotzdem aktivieren?"<name>: riskant! [Findings auflisten]. Empfehlung: Nur in Sandbox ausfuehren. Behalten oder loeschen?"<name>: GEFAEHRLICH! [Top-Findings]. Empfehlung: Sofort loeschen. Soll ich ihn entfernen?"If critical: offer to delete the skill folder immediately
If user confirms deletion: rm -rf <skill-path>
python3 {baseDir}/scripts/scan_skill.py <path-to-skill>
JSON output:
python3 {baseDir}/scripts/scan_skill.py <path-to-skill> --json
Accepts skill folders (containing SKILL.md) and packaged .skill files.
Scan every skill in a directory:
for d in ~/.openclaw/skills/*/; do
python3 {baseDir}/scripts/scan_skill.py "$d"
echo ""
done
Static analysis catches patterns, not intent. Cannot detect:
Combine with manual review for high-stakes deployments.