Skill Trust Guard

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is openly designed as an install-time safety wrapper, but its registry-skill workflow uses `clawhub install --force` before the scan, so its main safety promise depends on that temporary install being harmless.

Before installing, confirm that `clawhub install --dir <temp>` cannot execute untrusted install hooks or other side effects, and verify that the external `skill-trust-scanner` path points to a trusted, pinned scanner. Prefer explicit use of `install.sh` until you are comfortable with the persistent PATH shim, and avoid `--yes` for warning-range skills unless you have reviewed the scan result.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A skill that should be blocked might still get partially installed or have install-time effects during the temporary fetch step, depending on how `clawhub install` behaves.

Why it was flagged

For registry targets, the wrapper invokes `clawhub install` with `--force` into a temporary directory before it runs the security scan. If `clawhub install` performs install-time side effects, untrusted skill behavior could occur before the guard makes its allow/block decision.

Skill content
if ! clawhub "${GLOBAL_OPTS[@]}" --dir "$TMPDIR" install "$TARGET" "${INSTALL_OPTS[@]}" --force ...
...
log "Running pre-install security scan..."
Recommendation

Use a true download/inspect API or archive fetch that cannot run install hooks, then scan that content before any install command. Document the containment guarantees if the temporary install approach is retained.

What this means

The guard’s decisions depend on whatever scanner code is present locally, so a missing, changed, or untrusted scanner could make the wrapper ineffective or unreliable.

Why it was flagged

The core trust decision relies on an external scanner located at a mutable local path and executed through `npx tsx`, but that scanner code and its version are not included in the reviewed artifacts.

Skill content
SCANNER_ROOT="${SCANNER_ROOT:-/home/guofeng/clawd/skill-trust-scanner}"
SCANNER_CLI="${SCANNER_CLI:-$SCANNER_ROOT/src/cli.ts}"
RAW=$(cd "$SCANNER_ROOT" && npx tsx "$SCANNER_CLI" "$SKILL_PATH" --json ...)
Recommendation

Install the scanner from a trusted source, pin its version, avoid implicit `npx` resolution where possible, and verify `SCANNER_ROOT`/`SCANNER_CLI` before relying on the guard.

What this means

Future install commands may be routed through this wrapper instead of the original CLI, which can block, warn, or change installation flow.

Why it was flagged

The integration step creates a persistent local `clawhub` shim that intercepts future `clawhub install` commands when the shim directory is placed earlier in PATH.

Skill content
SHIM_DIR="$HOME/.openclaw/bin"
cat > "$SHIM_DIR/clawhub" <<EOF
...
if [[ \$# -gt 0 && "\$1" == "install" ]]; then
  shift
  exec "$GUARD_DIR/install.sh" "\$@"
fi
Recommendation

Only enable the PATH shim if you want ongoing interception. To disable it, remove `~/.openclaw/bin/clawhub` or remove `~/.openclaw/bin` from the front of PATH.