Back to skill
Skillv1.0.0

ClawScan security

Agent Audit Shield · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousMar 4, 2026, 2:26 PM
Verdict
suspicious
Confidence
high
Model
gpt-5-mini
Summary
The SKILL.md advertises real-time OS/LLM interception and a TUI approval workflow but contains no code, no install steps, and no declared permissions—the claimed capabilities do not match the actual artifact.
Guidance
This package is marketing copy without implementation: it promises real-time OS/LLM interception, blocking, and a TUI but provides no code, installers, or permissions to do that work. Do not rely on it for protection. Before installing or running anything: ask for the source repository and reviewed code, a clear install procedure, the exact binaries/services that will be installed, what system privileges are required, how payment is handled, and an explanation of how it enforces network/file policies. If the author cannot produce verifiable source and a reproducible build, treat the skill as non-functional (or potentially malicious if later bundled with opaque installers) and do not grant elevated privileges or send secrets to it.

Review Dimensions

Purpose & Capability
concernThe skill claims to act as a 'Sovereign Interceptor' that blocks exfiltration and prevents rm -rf outside workdirs, yet there are no code files, no required binaries, no install spec, and no declared system privileges. Those capabilities would require binaries, kernel/network hooks, or helper services; none are provided or requested, making the claimed purpose unsupported by the package contents.
Instruction Scope
concernSKILL.md is high-level marketing prose and a single usage example (npx openclaw skill run agent-audit-shield --hardened) but contains no runtime instructions for how to intercept LLM↔OS traffic, perform heuristic analysis, present a TUI, or enforce network policies. The instructions are vague and grant broad, undefined authority without specifying which files, paths, or system interfaces will be read or modified.
Install Mechanism
noteThere is no install specification or code—this minimizes direct disk/write risk but also means the skill cannot actually implement the security features it advertises. The lack of an install step is inconsistent with the claimed runtime behavior (TUI, real-time blocking), which would normally require installing a helper binary or service.
Credentials
noteNo environment variables, credentials, or config paths are requested, which is proportionate from a least-privilege perspective. However the metadata includes a payment fee in USDC without explaining how payments are collected or authorized — that mismatch should be clarified before trusting the skill to handle paid sessions.
Persistence & Privilege
concernThe skill's description implies privileged, persistent interception of agent behavior and system-level enforcement, but the package does not request or document any such privileges. This is misleading: either the skill cannot provide the promised interception, or it requires elevated privileges that are not disclosed.