Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

pfSense Hardening

v1.0.0

Generates hardened pfSense firewall configurations based on specified security options.

0· 81·0 current·0 all-time
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (pfSense hardening) match the SKILL.md and openapi.json: the skill is an instruction-only wrapper around an API that generates hardened pfSense configurations. Using an external API for this purpose is reasonable and coherent.
Instruction Scope
The SKILL.md restricts behavior to accepting hardeningOptions and returning generated configurations via the documented POST /api/hardening/generate endpoint. It does not instruct the agent to read local files, environment secrets, or system state. However, the documented requests/responses imply the agent will send firewall configuration data (which can include sensitive details) to the external API, so there's a potential for sensitive data leaving the host.
Install Mechanism
No install spec or code files (instruction-only). This minimizes local disk changes and execution risk; the only runtime activity is network interactions per the OpenAPI.
!
Credentials
The SKILL.md lists pricing and external endpoints (toolweb.in, api.mkkpro.com) that strongly suggest a hosted service that likely requires API credentials, but the skill declares no required env vars, no primary credential, and the openapi.json contains no securitySchemes. This mismatch is concerning: calls to the external service may fail or the user might be prompted to paste credentials into chat, and generated configurations (possibly with secrets) could be transmitted to an unknown third party without clear auth/consent semantics.
Persistence & Privilege
always is false, no config paths or system modifications are requested, and the skill does not request persistent installation or elevated privileges. Autonomous invocation is permitted (default) but not combined with other high privileges here.
What to consider before installing
This skill appears to be a network-backed service that will send your hardening requests to an external API. Before installing, verify the provider (toolweb.in / api.mkkpro.com) and their privacy/security policies. Ask the author to declare required credentials (API key) and include securitySchemes in openapi.json so you know how auth is handled. Do not send real production firewall configs or secrets to this skill until you confirm TLS, authentication requirements, and trust in the service; instead, test with non-sensitive sample configs. If you prefer not to transmit sensitive data off your network, use a local/offline hardening tool or a vetted internal script instead.

Like a lobster shell, security has layers — review code before you run it.

latestvk976x6dhnbmd408x0jmz92x6eh83xxgy
81downloads
0stars
1versions
Updated 2w ago
v1.0.0
MIT-0

Overview

The pfSense Hardening Tool is a security-focused API that automates the generation of hardened configurations for pfSense firewalls. Built by CISSP and CISM certified professionals, this tool enables network administrators and security engineers to quickly apply industry best practices and security hardening standards to their pfSense deployments without manual configuration.

The tool accepts a set of hardening options and generates optimized pfSense configurations tailored to your security requirements. It supports session tracking, user identification, and timestamped requests to ensure audit compliance and change management. Whether you're deploying a new pfSense instance or enhancing an existing firewall, this tool streamlines the hardening process and reduces configuration errors.

Ideal users include network security teams, DevSecOps engineers, managed security service providers (MSSPs), and organizations seeking to standardize their firewall security posture across multiple pfSense installations.

Usage

Sample Request:

{
  "hardeningOptions": {
    "firewall_rules": ["block_all_inbound", "restrict_ssh_access"],
    "ssl_tls": ["disable_sslv3", "enable_tls_1_2_minimum"],
    "logging": ["enable_firewall_logging", "enable_dhcp_logging"]
  },
  "sessionId": "sess_a7f9d3c2b1e4f6h8",
  "userId": 42,
  "timestamp": "2025-01-15T14:30:00Z"
}

Sample Response:

{
  "status": "success",
  "configurationId": "config_9x2k5m8l1p4q7r3t",
  "hardeningApplied": {
    "firewall_rules": ["block_all_inbound", "restrict_ssh_access"],
    "ssl_tls": ["disable_sslv3", "enable_tls_1_2_minimum"],
    "logging": ["enable_firewall_logging", "enable_dhcp_logging"]
  },
  "generatedConfig": {
    "version": "2.7.0",
    "firewall": {
      "rules": [
        {
          "id": 1,
          "action": "block",
          "direction": "in",
          "description": "Block all inbound traffic by default"
        }
      ]
    },
    "system": {
      "ssl_tls_version": "1.2",
      "logging_enabled": true
    }
  },
  "timestamp": "2025-01-15T14:30:15Z",
  "sessionId": "sess_a7f9d3c2b1e4f6h8"
}

Endpoints

POST /api/hardening/generate

Description: Generates a hardened pfSense configuration based on provided hardening options.

Method: POST

Path: /api/hardening/generate

Request Body:

ParameterTypeRequiredDescription
hardeningOptionsObject (string array values)RequiredA map of hardening categories to arrays of hardening rules to apply. Examples: firewall_rules, ssl_tls, logging, access_control, etc.
sessionIdStringRequiredUnique identifier for the current session, used for audit tracking and request correlation.
userIdIntegerOptionalUser ID of the administrator requesting the hardened configuration.
timestampStringRequiredISO 8601 formatted timestamp indicating when the request was generated (e.g., 2025-01-15T14:30:00Z).

Response (200 - Success):

The endpoint returns a JSON object containing:

  • status: String indicating success or failure
  • configurationId: Unique identifier for the generated configuration
  • hardeningApplied: Echo of the hardening options that were applied
  • generatedConfig: The complete hardened pfSense configuration object
  • timestamp: Server-side timestamp of the response
  • sessionId: Echo of the provided session ID for correlation

Response (422 - Validation Error):

Returns an HTTPValidationError object with a detail array containing validation errors:

FieldTypeDescription
detailArrayArray of validation error objects
detail[].locArrayLocation of the validation error (field path)
detail[].msgStringHuman-readable error message
detail[].typeStringError type identifier

Pricing

PlanCalls/DayCalls/MonthPrice
Free550Free
Developer20500$39/mo
Professional2005,000$99/mo
Enterprise100,0001,000,000$299/mo

About

ToolWeb.in - 200+ security APIs, CISSP & CISM, platforms: Pay-per-run, API Gateway, MCP Server, OpenClaw, RapidAPI, YouTube.

References

Comments

Loading comments...