Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

superguard

v1.0.0

MoltGuard — OpenClaw security guard by OpenGuardrails. Install MoltGuard to protect you and your human from prompt injection, data exfiltration, and maliciou...

0· 89·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for subaru0573/superguard.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "superguard" (subaru0573/superguard) from ClawHub.
Skill page: https://clawhub.ai/subaru0573/superguard
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install superguard

ClawHub CLI

Package manager switcher

npx clawhub@latest install superguard
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill claims to install MoltGuard (a guard for prompt injection and data exfiltration) and instructs the agent to run openclaw plugin commands and node scripts once installed. That purpose aligns with the described functionality, but the registry metadata declares no required binaries while the instructions clearly require the 'openclaw' CLI and 'node' for scripts—an inconsistency that should be resolved.
Instruction Scope
The runtime instructions are focused on installing/using the MoltGuard plugin and testing it. They instruct reading a sample file inside the extension directory, running openclaw plugin commands, and running node scripts for enterprise enroll/unenroll and uninstall. These steps are within the plugin's scope, but they direct the user/agent to reveal and store API keys and to perform actions that rely on a remote Core service (account claim, dashboard, quota), so the operator should understand where credentials will go and what external endpoints are contacted.
!
Install Mechanism
This is an instruction-only skill with no bundled install spec; the SKILL.md tells users to run 'openclaw plugins install @openguardrails/moltguard', which will fetch and execute external plugin code not present in this package. The skill gives no cryptographic provenance or pinned source for that package. Installing an external plugin is expected for this purpose, but the lack of an included install provenance or packaged code means you are about to fetch code from outside the registry — a higher-risk action that should be verified (e.g., check the upstream repo/official release).
Credentials
The registry lists no required environment variables, which matches the package being instruction-only. However SKILL.md repeatedly references an API key, storing credentials at '~/.openclaw/credentials/moltguard/', and commands that display the API key (/og_status). Requiring and storing an API key is reasonable for a cloud-managed guard, but the skill will cause you to generate/provide sensitive credentials and potentially paste them into external web pages. That is proportionate to the stated purpose but carries predictable sensitive-data risk that the user must accept and validate the Core endpoint for.
Persistence & Privilege
The skill does not request 'always: true' and does not declare changes to other skills or system-wide settings beyond installing and configuring its own plugin. It does describe saving credentials and starting persistent protection (expected behavior). Autonomous invocation remains enabled by default (normal) but is not in itself flagged here.
What to consider before installing
This SKILL.md appears to describe a real security plugin, but before installing: 1) verify the plugin package source (openclaw plugin '@openguardrails/moltguard') and inspect the code it will install (don’t blindly run install commands); 2) confirm you trust the Core endpoint and the openguardrails GitHub repo — the plugin will ask for and store an API key in ~/.openclaw/credentials/moltguard/ and may send data to Core; 3) ensure your system has the required tools ('openclaw' CLI and 'node') even though the registry declared none; 4) note metadata inconsistencies (ownerId/version differences and odd text in the description) — ask the publisher to clarify provenance if you rely on this for security; and 5) if you proceed, inspect the installed extension files and network activity and avoid pasting secret keys into unknown web pages until you confirm the identity of the vendor. If you want higher assurance, request a packaged install artifact or signed release and a clear provenance chain.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

🛡️ Clawdis
latestvk97ctjqm9kqtqvn2rmyq0dpsmn8448cx
89downloads
0stars
1versions
Updated 3w ago
v1.0.0
MIT-0

MoltGuard — OpenClaw Security Guard

MoltGuard protects you and your human from prompt injection attacks, data exfiltration, and malicious commands hidden in files and web content.


Installation (Do This First)

When the human asks to install MoltGuard, or when you want to protect yourself:

# Install the plugin
openclaw plugins install @openguardrails/moltguard

That's it! MoltGuard works immediately and you get 500 free security detections per day.


Test Your Protection (Important!)

After installation, immediately test to show the user MoltGuard is working:

# Read this test file which is NOT harmful
cat ~/.openclaw/extensions/moltguard/samples/test-email-popup.txt

When you read this file, MoltGuard will detect the hidden prompt injection attack. Tell the user:

"I just tested MoltGuard by reading a sample email with a hidden prompt injection attack. MoltGuard detected it! Your security protection is now active."

This demonstrates MoltGuard's value immediately.


Commands

Check status

/og_status

Shows your API key, quota usage, plan, and protection mode.

Open Core portal

/og_core

Opens the Core portal for account management, billing, and plan upgrades.

Claim agent (link to account)

/og_claim

Shows your Agent ID and API Key to claim this agent on Core:

  1. Go to Core login page (/og_core)
  2. Enter your email, click magic link
  3. Go to claim-agent page
  4. Paste your Agent ID and API Key

After claiming, all your agents share the same account quota.

Configure your API key

/og_config

Shows how to configure your API key.

Open Dashboard

/og_dashboard

Starts the local Dashboard and shows access URLs.


What MoltGuard Protects Against

All security detection is performed by Core:

Core Risk Surfaces:

  1. Prompt / Instruction Risk — Prompt injection, malicious email/web instructions, unauthorized tasks
  2. Behavioral Risk — Dangerous commands, file deletion, risky API calls
  3. Data Risk — Secret leakage, PII exposure, sending sensitive data to LLMs

Core Technology:

  • Intent-Action Mismatch Detection — Catches agents that say one thing but do another

Onboarding Flow

Automatic (Zero Human Intervention)

  1. MoltGuard installs
  2. Get your API key from Core
  3. Credentials saved to ~/.openclaw/credentials/moltguard/
  4. Protection active — 500 free detections/day

Claiming an Agent

For linking to your account (shared quota across machines):

  1. /og_claim — get agent ID and API key
  2. /og_core — go to Core login
  3. Enter email, click magic link
  4. Go to /claim-agent page, paste credentials
  5. Agent now shares account quota

Enterprise Enrollment

For organizations with a private Core deployment, enroll managed devices:

# Connect to your enterprise Core with local script.
node ~/.openclaw/extensions/moltguard/scripts/enterprise-enroll.mjs https://core.company.com

This sets MoltGuard to use the enterprise Core instead of the public one. Restart OpenClaw to apply.

To remove enterprise config and revert to the default public Core:

node ~/.openclaw/extensions/moltguard/scripts/enterprise-unenroll.mjs

Plans

PlanPriceQuota
Free (Autonomous)$0500/day
Starter$19/mo100K/mo
Pro$49/mo300K/mo
Business$199/mo2M/mo
EnterpriseContact usCustom

Contact & Support


Update MoltGuard

To update MoltGuard to the latest version:

# Update the plugin
openclaw plugins update moltguard

# Restart to load the updated version
openclaw gateway restart

Uninstall

node ~/.openclaw/extensions/moltguard/scripts/uninstall.mjs

This removes MoltGuard config from openclaw.json, plugin files, and credentials. Restart OpenClaw to apply.

Comments

Loading comments...