safehub

Scan OpenClaw skills for malware and security issues before installation. Use when the user wants to verify a skill is safe, audit a ClawHub skill, or check a local or GitHub skill.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "safehub" with this command: npx skills add sumeetghimire/safehub

SafeHub

SafeHub is a security scanner for OpenClaw skills. It runs static analysis (Semgrep) and optional sandbox execution (Docker) on any skill—by name, local path, or GitHub URL—and returns a trust score and a clear recommendation: safe to install, install with caution, or not safe.

Requirements

These binaries must be on your PATH (declared in registry metadata):

  • Node.js (18+) — required to run the CLI.
  • Semgrep — required for the scan command (static analysis). Install with brew install semgrep or npm install -g semgrep.
  • git — required when the scan target is a GitHub URL (used to clone the repo).

Optional:

  • Docker — used for sandbox execution. If Docker is not available, use --no-sandbox for static-only scanning.

Environment variables

All of these are optional. No secrets or API tokens are required by default.

VariableDefaultEffect
SAFEHUB_RULES_REPOsafehub/safehubGitHub repo (owner/repo) used by safehub update to fetch and overwrite local rule files in ./rules. Setting this to another repo makes the updater pull rules from that repo — use only repos you trust.
SAFEHUB_RULES_BRANCHmainBranch name used when fetching rules (with SAFEHUB_RULES_REPO).
SAFEHUB_DATA_DIR~/.safehubDirectory for cached scan reports (e.g. ~/.safehub/reports).
SAFEHUB_SANDBOX_IMAGEnode:18-alpineDocker image used for the sandbox when scanning.
SAFEHUB_SANDBOX_TIMEOUT_MS30000Timeout (ms) for the sandbox run before the container is killed.
SAFEHUB_NO_TYPING(unset)Set to 1 to disable the typing-effect output (e.g. in CI or pipes).

Important: SAFEHUB_RULES_REPO controls where safehub update downloads rules from and overwrites local ./rules; only point it at a repo you trust.

Commands

All commands are run via the safehub CLI (e.g. safehub scan <target> or node index.js scan <target> from the skill directory).

scan

Scan a skill by ClawHub name, local path, or GitHub URL.

Examples:

safehub scan web-scraper
safehub scan ./my-local-skill
safehub scan https://github.com/user/their-skill
safehub scan https://github.com/BenedictKing/tavily-web --no-sandbox

Options:

  • --no-sandbox — Skip Docker sandbox; run static analysis only (use when Docker is not installed).

report

Show the last scan report for a skill without rescanning.

Examples:

safehub report web-scraper
safehub report risky-skill

update

Pull the latest Semgrep scanner rules from the SafeHub GitHub repo (or your fork via SAFEHUB_RULES_REPO).

Examples:

safehub update
SAFEHUB_RULES_REPO=owner/repo safehub update

Example output

After running safehub scan <target>, you’ll see:

  • Static analysis — Findings from Semgrep (network, filesystem, eval/exec, env, obfuscation).
  • Sandbox behavior — Whether the skill attempted network access or suspicious actions (when Docker is used).
  • Trust score (0–100) and recommendation: SAFE TO INSTALL, INSTALL WITH CAUTION, or NOT SAFE TO INSTALL.

Installation (users)

Install from ClawHub:

clawhub install safehub

Or install the CLI globally from npm:

npm install -g safehub

Then run safehub scan <target> (if the CLI is on PATH) or node index.js scan <target> from the skill directory.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Agent Causal

Analyze experiment data with A/B tests and Difference-in-Differences to recommend shipping, continuing, or rolling back changes with detailed audit trails.

Registry SourceRecently Updated
Security

Code Review Inspector

Automated code review checking for bugs, security issues, best practices, performance problems, and code style

Registry SourceRecently Updated
250Profile unavailable
Security

Docker Optimizer

Optimize Dockerfiles with multi-stage builds, layer caching, security best practices, and size reduction techniques

Registry SourceRecently Updated
260Profile unavailable
Security

Skill Auditor

Audit core: a classification taxonomy and a severity scoring function, kept orthogonal. Operates on the whole skill bundle (SKILL.md plus any referenced scri...

Registry SourceRecently Updated
1250Profile unavailable