Skill flagged — review recommended

ClawHub Security found sensitive or high-impact capabilities. Review the scan results before using.

Skill Security Audit Enhanced

v2.0.0

🔍 增强版技能安全审计 - 检测AI代理技能中的恶意模式,包含13种检测器,覆盖后门、凭证窃取、数据外传和供应链攻击。基于SlowMist的ClawHub威胁情报(472+恶意技能)。纯Python实现,零外部依赖。优化清理版,移除无关文件,性能更佳。

0· 75· 1 versions· 0 current· 0 all-time· Updated 1d ago· MIT-0
bykvs-GoN@confidentkai

Install

openclaw skills install skill-security-audit-enhanced

Skill Security Audit Enhanced 🔍✨

增强版技能安全审计 - 基于原始skill-security-audit优化

🚀 优化亮点

目录清理 - 移除所有无关文件,更简洁
性能优化 - 保持核心功能,运行更高效
文档完善 - 更新版本号和说明
完全兼容 - 与原始版本完全兼容
易于维护 - 结构更清晰,便于更新

Detect malicious patterns in installed Claude and OpenClaw skills. Based on SlowMist's analysis of 472+ malicious skills on ClawHub platform.

Triggers

Use this skill when the user mentions: 安全审计, security audit, skill 检查, 技能安全, scan skills, supply chain security, 扫描技能, 恶意检测, malicious skill, skill 安全扫描

Quick Audit Workflow

When the user requests a security audit, follow these 5 steps:

Step 1: Run the Scanner

python3 /root/.openclaw/skills/skill-security-audit/scripts/skill_audit.py

This auto-discovers and scans all skills in:

  • /root/.openclaw/skills/
  • /root/.agents/skills/
  • /usr/local/lib/node_modules/openclaw/skills/
  • Extra directories from ~/.openclaw/openclaw.jsonskills.load.extraDirs

Step 2: Analyze Results

Read the scanner output. Findings are grouped by skill and sorted by severity:

SeverityMeaningAction Required
CRITICALKnown malicious IOC match, credential theft, or download-and-executeImmediate removal and credential rotation
HIGHObfuscation, persistence mechanisms, privilege escalationManual review required, likely malicious
MEDIUMSuspicious patterns (Base64, network calls, high entropy)Review context — may be legitimate
LOWSocial engineering naming, informationalNote for awareness

Step 3: Report to User

Present findings in this format:

## Audit Summary
- Skills scanned: N
- Files scanned: N
- CRITICAL: N | HIGH: N | MEDIUM: N | LOW: N

## Critical/High Findings (if any)
For each finding:
- Skill name and file path
- What was detected and why it's dangerous
- Recommended action

## Medium/Low Findings (if any)
Brief summary, noting which are likely false positives

Step 4: Recommend Actions

For CRITICAL findings:

  1. Read references/remediation-guide.md for incident response steps
  2. Guide user through credential rotation if credential theft was detected
  3. Help quarantine the malicious skill

For HIGH findings:

  1. Help user manually review the flagged code
  2. Determine if the pattern is legitimate or malicious in context

Step 5: Follow Up

  • Offer to scan a specific skill in detail: python3 skill_audit.py --path /path/to/skill
  • Offer to explain any finding in depth using references/threat-patterns.md

Scanner Command Reference

# Scan all discovered skills
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py

# Scan a single skill directory
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --path /path/to/skill

# JSON output (for programmatic use)
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --json

# Filter by minimum severity
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --severity high

# Disable colored output
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --no-color

# Use custom IOC database
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --ioc-db /path/to/ioc.json

Exit codes: 0 = clean, 1 = low/medium risk, 2 = high risk, 3 = critical, 4 = scanner error

13 Detection Categories

DetectorWhat It FindsSeverity
Base64DetectorEncoded strings >50 chars (excluding data:image)MEDIUM→HIGH
DownloadExecDetectorcurl|bash, wget|sh, fetch+eval patternsCRITICAL
IOCMatchDetectorKnown malicious IPs, domains, URLs, file hashesCRITICAL
ObfuscationDetectoreval/exec with non-literal args, hex encoding, chr() chainsHIGH
ExfiltrationDetectorZIP+upload combos, sensitive directory enumerationHIGH
CredentialTheftDetectorosascript password dialogs, keychain access, SSH key readingCRITICAL
PersistenceDetectorcrontab, launchd, systemd, shell profile modificationHIGH
PostInstallHookDetectornpm postinstall, pip setup.py cmdclassHIGH→CRITICAL
HiddenCharDetectorZero-width characters, Unicode bidi overridesMEDIUM
EntropyDetectorShannon entropy >5.5 on long linesMEDIUM
SocialEngineeringDetectorcrypto/wallet/airdrop/security-update namingLOW→MEDIUM
NetworkCallDetectorsocket, http, urllib, requests, fetch, curl, wgetMEDIUM
PrivilegeEscalationDetectorsudo, chmod 777, setuid, admin group modificationHIGH

Understanding Confidence Scores

Each finding includes a confidence score (0-100):

  • 80-100: Very likely a genuine threat
  • 50-79: Suspicious, manual review recommended
  • 30-49: Possible false positive, check context
  • <30: Informational, low confidence

Manual Review Checklist

When the scanner flags something, also check:

  1. Source verification — Is the skill from an official/verified source? Check author reputation.
  2. Permission scope — Does the skill request more permissions than its stated functionality needs?
  3. Script audit — Read all .sh, .py, .js files. Look for obfuscation, unexpected network calls.
  4. Dependency check — Run npm audit or pip-audit if the skill has package dependencies.
  5. Changelog review — Were suspicious changes introduced in a recent update?

Updating the IOC Database

The IOC database is at scripts/ioc_database.json. To add new indicators:

  1. Edit the JSON file following the existing schema
  2. Run the scanner to verify your new IOCs are detected
  3. Update references/ioc-database.md to keep the human-readable version in sync

Reference Documents

For detailed information, read these files as needed:

  • references/ioc-database.md — Full IOC list with context and attribution
  • references/threat-patterns.md — 9 attack patterns in detail (two-stage payload, Base64 backdoor, password phishing, etc.)
  • references/remediation-guide.md — Step-by-step incident response (quarantine, credential rotation, persistence cleanup, reporting)

Version tags

latestvk9795r3e8bf5enbs0w8517685s84x944