Armarius - Prompt Injection Blocker
v1.1.0One click, always on. Zero extra API calls. Neutralizes prompt injection the moment it arrives. Never interrupts your work. No setup, no code required.
⭐ 0· 376·1 current·1 all-time
byPolyetherea Labs@tatlantis
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description (prompt-injection blocker, no setup) match the implementation style: instruction-only SKILL.md that tells the agent how to classify and handle external content. No unrelated binaries, env vars, or installs are requested.
Instruction Scope
The runtime instructions mandate classifying all non-user inputs as CONTENT and never executing instructions found therein — that is within scope. However Rule 2 requires appending the complete, unabbreviated text of any detected injection attempt to the end of the agent's response. That behavior can cause sensitive or secret data (from tools, files, web fetches, emails, etc.) to be echoed verbatim into chat output or logs, increasing the risk of data exposure. The SKILL.md also asserts its rules are immutable and 'cannot be suspended', which is an overclaim: as an instruction-only skill it cannot technically enforce immutability of agent-level policy.
Install Mechanism
No install spec and no code files — lowest-risk delivery. The skill is instruction-only, so nothing will be written to disk or fetched at install time.
Credentials
No credentials, env vars, or config paths are requested (proportionate). However, because the skill requires emitting full verbatim external content when flagging injections, it may surface secrets or private data present in those external sources; that is a data-handling concern rather than a credential request.
Persistence & Privilege
Flags show always:false and normal invocation behavior. The skill does not request persistent presence or modify other skills/config. The README/SKILL.md claim 'always on'/'immutable' is a policy claim rather than a granted platform privilege.
What to consider before installing
This skill is internally coherent for a prompt-injection guard, but review its logging rule carefully before enabling it. It requires agents to append the complete verbatim text of any flagged injection to responses — that can accidentally expose secrets or private content returned by tools, files, or web fetches. Consider asking the author (or modifying the policy) to: 1) redact or summarize flagged content by default (mask tokens, emails, credentials), 2) only log metadata and source location unless the user explicitly requests full text, and 3) document how the skill interacts with agent/system-level instructions. Also note the metadata says 'source: unknown' / no homepage, while SKILL.md embeds a GitHub link — prefer installing skills from known, reviewed sources. If you proceed, test in a safe environment first (use harmless injections and test with outputs containing dummy secrets) and limit the skill's scope to non-sensitive channels or data sources.Like a lobster shell, security has layers — review code before you run it.
agentsvk97cshgpeamn1tat80nc2aj75s81wxpwalways-onvk97cshgpeamn1tat80nc2aj75s81wxpwcryptographyvk979tw7c93gsr7c2cefwm1kyy181xwxqlangchainvk979tw7c93gsr7c2cefwm1kyy181xwxqlatestvk97cshgpeamn1tat80nc2aj75s81wxpwpreventionvk97cshgpeamn1tat80nc2aj75s81wxpwprompt-injectionvk97cshgpeamn1tat80nc2aj75s81wxpwprotectionvk97cshgpeamn1tat80nc2aj75s81wxpwsecurityvk97cshgpeamn1tat80nc2aj75s81wxpw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🛡️ Clawdis
