Ssl Checker
Security checks across static analysis, malware telemetry, and agentic risk
Overview
This appears to be a simple SSL-checking helper with no evidence of credential theft or exfiltration, though it relies on local OpenSSL commands and has minor metadata/input-handling issues.
This skill looks safe for basic SSL checks, but only run it against domains you have permission to test. Be aware that the documented commands may not work as written due to an argument-handling bug, and OpenSSL should be installed from a trusted source.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The skill will initiate network connections to domains it is asked to check; unusual or untrusted domain strings may cause confusing or unintended OpenSSL behavior.
The skill runs OpenSSL network probes against a supplied domain, which is expected for SSL auditing, but the domain variable is unquoted and not validated, so malformed inputs could be interpreted unexpectedly by OpenSSL.
echo | openssl s_client -connect $2:443 -servername $2 2>/dev/null | openssl x509 -noout -subject -issuer -dates
Use it only for domains you are authorized to audit, and maintainers should quote variables and validate hostnames before passing them to OpenSSL.
The skill may fail or rely on whichever OpenSSL binary is available on the user's system.
The metadata says no binaries are required, while the included script invokes OpenSSL; this is a purpose-aligned but under-declared local dependency.
Required binaries (all must exist): none; Required binaries (at least one): none
Declare OpenSSL as a required binary and ensure users rely on a trusted local OpenSSL installation.
