Install
openclaw skills install skill-security-audit-enhanced🔍 增强版技能安全审计 - 检测AI代理技能中的恶意模式,包含13种检测器,覆盖后门、凭证窃取、数据外传和供应链攻击。基于SlowMist的ClawHub威胁情报(472+恶意技能)。纯Python实现,零外部依赖。优化清理版,移除无关文件,性能更佳。
openclaw skills install skill-security-audit-enhanced增强版技能安全审计 - 基于原始skill-security-audit优化
✅ 目录清理 - 移除所有无关文件,更简洁
✅ 性能优化 - 保持核心功能,运行更高效
✅ 文档完善 - 更新版本号和说明
✅ 完全兼容 - 与原始版本完全兼容
✅ 易于维护 - 结构更清晰,便于更新
Detect malicious patterns in installed Claude and OpenClaw skills. Based on SlowMist's analysis of 472+ malicious skills on ClawHub platform.
Use this skill when the user mentions: 安全审计, security audit, skill 检查, 技能安全, scan skills, supply chain security, 扫描技能, 恶意检测, malicious skill, skill 安全扫描
When the user requests a security audit, follow these 5 steps:
python3 /root/.openclaw/skills/skill-security-audit/scripts/skill_audit.py
This auto-discovers and scans all skills in:
/root/.openclaw/skills//root/.agents/skills//usr/local/lib/node_modules/openclaw/skills/~/.openclaw/openclaw.json → skills.load.extraDirsRead the scanner output. Findings are grouped by skill and sorted by severity:
| Severity | Meaning | Action Required |
|---|---|---|
| CRITICAL | Known malicious IOC match, credential theft, or download-and-execute | Immediate removal and credential rotation |
| HIGH | Obfuscation, persistence mechanisms, privilege escalation | Manual review required, likely malicious |
| MEDIUM | Suspicious patterns (Base64, network calls, high entropy) | Review context — may be legitimate |
| LOW | Social engineering naming, informational | Note for awareness |
Present findings in this format:
## Audit Summary
- Skills scanned: N
- Files scanned: N
- CRITICAL: N | HIGH: N | MEDIUM: N | LOW: N
## Critical/High Findings (if any)
For each finding:
- Skill name and file path
- What was detected and why it's dangerous
- Recommended action
## Medium/Low Findings (if any)
Brief summary, noting which are likely false positives
For CRITICAL findings:
references/remediation-guide.md for incident response stepsFor HIGH findings:
python3 skill_audit.py --path /path/to/skillreferences/threat-patterns.md# Scan all discovered skills
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py
# Scan a single skill directory
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --path /path/to/skill
# JSON output (for programmatic use)
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --json
# Filter by minimum severity
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --severity high
# Disable colored output
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --no-color
# Use custom IOC database
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --ioc-db /path/to/ioc.json
Exit codes: 0 = clean, 1 = low/medium risk, 2 = high risk, 3 = critical, 4 = scanner error
| Detector | What It Finds | Severity |
|---|---|---|
| Base64Detector | Encoded strings >50 chars (excluding data:image) | MEDIUM→HIGH |
| DownloadExecDetector | curl|bash, wget|sh, fetch+eval patterns | CRITICAL |
| IOCMatchDetector | Known malicious IPs, domains, URLs, file hashes | CRITICAL |
| ObfuscationDetector | eval/exec with non-literal args, hex encoding, chr() chains | HIGH |
| ExfiltrationDetector | ZIP+upload combos, sensitive directory enumeration | HIGH |
| CredentialTheftDetector | osascript password dialogs, keychain access, SSH key reading | CRITICAL |
| PersistenceDetector | crontab, launchd, systemd, shell profile modification | HIGH |
| PostInstallHookDetector | npm postinstall, pip setup.py cmdclass | HIGH→CRITICAL |
| HiddenCharDetector | Zero-width characters, Unicode bidi overrides | MEDIUM |
| EntropyDetector | Shannon entropy >5.5 on long lines | MEDIUM |
| SocialEngineeringDetector | crypto/wallet/airdrop/security-update naming | LOW→MEDIUM |
| NetworkCallDetector | socket, http, urllib, requests, fetch, curl, wget | MEDIUM |
| PrivilegeEscalationDetector | sudo, chmod 777, setuid, admin group modification | HIGH |
Each finding includes a confidence score (0-100):
When the scanner flags something, also check:
.sh, .py, .js files. Look for obfuscation, unexpected network calls.npm audit or pip-audit if the skill has package dependencies.The IOC database is at scripts/ioc_database.json. To add new indicators:
references/ioc-database.md to keep the human-readable version in syncFor detailed information, read these files as needed:
references/ioc-database.md — Full IOC list with context and attributionreferences/threat-patterns.md — 9 attack patterns in detail (two-stage payload, Base64 backdoor, password phishing, etc.)references/remediation-guide.md — Step-by-step incident response (quarantine, credential rotation, persistence cleanup, reporting)