OpenClaw Skill Auditor

v1.0.0

Scans ClawHub skills to detect malicious code, obfuscated payloads, and social engineering via pattern matching, deobfuscation, and LLM analysis before insta...

0· 1.5k·10 current·11 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for sypsyp97/openclaw-skill-auditor.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "OpenClaw Skill Auditor" (sypsyp97/openclaw-skill-auditor) from ClawHub.
Skill page: https://clawhub.ai/sypsyp97/openclaw-skill-auditor
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install openclaw-skill-auditor

ClawHub CLI

Package manager switcher

npx clawhub@latest install openclaw-skill-auditor
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
SKILL.md and the script implement a skill-auditor as described, but the runtime relies on external CLIs ('clawhub inspect' to fetch skills and optional 'gemini' for LLM analysis) even though the skill declares no required binaries/dependencies. That omission is an incoherence — a scanner that fetches remote skills and optionally runs LLM analysis legitimately needs those tools declared.
!
Instruction Scope
The instructions and script scan skill files (expected) but also copy suspicious snippets to a predictable /tmp file and explicitly instruct the OpenClaw agent to analyze them with an LLM. That workflow can expose full suspicious code to any LLM or other actor the agent uses. The SKILL.md also encourages reporting findings by emailing a personal address (steipete@gmail.com), which could leak code or sensitive material. The script itself does not exfiltrate over network, but its guidance promotes sending data externally.
Install Mechanism
No install spec (instruction-only) — the skill does not download or install third-party code at install time, which minimizes direct install risk.
Credentials
The skill does not request any environment variables or credentials (good). It scans target code for uses of $API_KEY, ~/.ssh, ~/.aws, etc., which is appropriate for a scanner. However, because it encourages copying suspicious snippets to /tmp and sending them for LLM analysis or email, there's a privacy/credential-leak risk if scanned code contains real secrets.
Persistence & Privilege
The skill does not request persistent/always-on privileges and does not modify other skills or system-wide settings. It runs on demand and uses temporary files, which is appropriate for a scanner.
Scan Findings in Context
[uses-clawhub-cli] expected: The script runs 'clawhub inspect' to fetch skills for analysis. That is necessary for a pre-install auditor, but the skill metadata does not list 'clawhub' as a required binary — the dependency should be declared.
[optional-gemini-llm-cli] expected: SKILL.md and script reference using a Gemini CLI for LLM intent analysis. Optional LLM tooling is reasonable, but it's not declared and the workflow copies suspicious code to /tmp for analysis, which can leak sensitive content to the LLM provider.
[writes-to-tmp-suspicious-file] unexpected: The script copies suspicious content to a predictable /tmp path (/tmp/skill-audit-<name>-suspicious.txt). For a scanner this is convenient, but predictable temporary file names increase the risk that other processes or users on the same host can read sensitive data.
[external-reporting-email] unexpected: SKILL.md instructs users to report suspicious skills by emailing steipete@gmail.com. Sending potentially sensitive code to a personal email is not required for auditing and could leak data; a formal reporting channel would be preferable.
What to consider before installing
This skill appears to implement a legitimate scanner, but review before use: (1) be aware it expects (but doesn't declare) the 'clawhub' CLI to fetch remote skills and optionally an LLM CLI (Gemini) for deeper analysis — install and verify those tools from trusted sources first; (2) run the auditor in an isolated sandbox or VM when scanning untrusted skills because it fetches remote skill packages; (3) the script writes collected suspicious snippets to a predictable /tmp file and suggests sending them to an LLM or emailing a personal address — do NOT send secrets or plaintext sensitive files to third-party LLMs or personal emails; (4) if you plan to use the LLM analysis path, configure it to use a trusted, privacy-preserving endpoint or do the analysis offline; and (5) ask the author to explicitly declare required binaries/dependencies and to remove or make the reporting workflow safer (use a private/internal reporting channel). If you need higher assurance, run the script on a throwaway environment and manually inspect its output before following any 'send' recommendations.

Like a lobster shell, security has layers — review code before you run it.

latestvk97dr8kh1c89pkjhmgmwp4rkt180q5cj
1.5kdownloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

Skill Auditor 🔍

Audit ClawHub skills for security threats before installing them.

Triggers

Use this skill when:

  • "Audit this skill"
  • "Check skill security"
  • Before installing any third-party skill

Usage

Method 1: Pre-install audit (recommended)

# Inspect without installing
clawhub inspect <skill-name>

# Run the audit script
~/.openclaw/workspace/skills/skill-auditor/scripts/audit.sh <skill-name>

Method 2: Audit an installed skill

~/.openclaw/workspace/skills/skill-auditor/scripts/audit.sh --local <skill-path>

Detection Layers

L1: Pattern Matching

SeverityPatternRisk
🔴 Highbase64.*|.*bashEncoded execution
🔴 Highcurl.*|.*bashRemote script execution
🔴 Higheval\( / exec\(Dynamic code execution
🔴 HighKnown C2 server IPsMalicious communication
🟡 MediumAccess to ~/.openclaw/Config theft
🟡 MediumReads $API_KEY etc.Credential leakage
🟡 MediumSocial engineering keywordsUser deception
🟢 LowRequires sudoElevated privileges

L2: Deobfuscation

Automatically decodes hidden malicious payloads:

  • Base64 — Decodes and scans for hidden commands
  • Hex — Decodes \x41\x42 format strings
  • Checks decoded content for C2 servers and dangerous commands

L3: LLM Analysis (optional)

Uses Gemini CLI to analyze suspicious code intent:

  • Semantic understanding beyond pattern matching
  • Detects novel/unknown threats
  • Requires gemini CLI installed

Known Indicators of Compromise (IoC)

C2 Server IPs

91.92.242.30  # ClawHavoc primary server

Malicious Domains

glot.io       # Hosts obfuscated scripts
webhook.site  # Data exfiltration endpoint

Social Engineering Keywords

OpenClawDriver    # Non-existent "driver"
ClawdBot Driver   # Social engineering lure
Required Driver   # Tricks users into installing malware

Output Format

═══════════════════════════════════════════
  SKILL AUDIT REPORT: <skill-name>
═══════════════════════════════════════════

🔴 HIGH RISK FINDINGS:
   [LINE 23] base64 encoded execution detected
   [LINE 45] curl|bash pattern found

🟡 MEDIUM RISK FINDINGS:
   [LINE 12] Accesses ~/.openclaw/ directory

🟢 LOW RISK FINDINGS:
   [LINE 5] Requires sudo for installation

═══════════════════════════════════════════
  VERDICT: ❌ DO NOT INSTALL
═══════════════════════════════════════════

Best Practices

  1. Always audit before install — Never skip the security check
  2. Trust no skill blindly — Including highly starred or popular ones
  3. Check updates — Skill updates may introduce malicious code
  4. Report suspicious skills — Send to steipete@gmail.com

Maintenance

Update this skill when new threats are discovered:

  1. New malicious IP → Add to MALICIOUS_IPS
  2. New malicious domain → Add to MALICIOUS_DOMAINS
  3. New social engineering lure → Add to SOCIAL_ENGINEERING
  4. New attack pattern → Add regex detection

Update location: variable definitions at the top of scripts/audit.sh

References

Comments

Loading comments...