skill-security-audit

Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "skill-security-audit" with this command: npx skills add smartchainark/skill-security-audit/smartchainark-skill-security-audit-skill-security-audit

Skill Security Audit

Detect malicious patterns in installed Claude and OpenClaw skills. Based on SlowMist's analysis of 472+ malicious skills on ClawHub platform.

Triggers

Use this skill when the user mentions: 安全审计, security audit, skill 检查, 技能安全, scan skills, supply chain security, 扫描技能, 恶意检测, malicious skill, skill 安全扫描

Quick Audit Workflow

When the user requests a security audit, follow these 5 steps:

Step 1: Run the Scanner

python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py

This auto-discovers and scans all skills in:

  • ~/.claude/skills/
  • ~/.openclaw/workspace/skills/
  • Extra directories from ~/.openclaw/openclaw.jsonskills.load.extraDirs

Step 2: Analyze Results

Read the scanner output. Findings are grouped by skill and sorted by severity:

SeverityMeaningAction Required
CRITICALKnown malicious IOC match, credential theft, or download-and-executeImmediate removal and credential rotation
HIGHObfuscation, persistence mechanisms, privilege escalationManual review required, likely malicious
MEDIUMSuspicious patterns (Base64, network calls, high entropy)Review context — may be legitimate
LOWSocial engineering naming, informationalNote for awareness

Step 3: Report to User

Present findings in this format:

## Audit Summary
- Skills scanned: N
- Files scanned: N
- CRITICAL: N | HIGH: N | MEDIUM: N | LOW: N

## Critical/High Findings (if any)
For each finding:
- Skill name and file path
- What was detected and why it's dangerous
- Recommended action

## Medium/Low Findings (if any)
Brief summary, noting which are likely false positives

Step 4: Recommend Actions

For CRITICAL findings:

  1. Read references/remediation-guide.md for incident response steps
  2. Guide user through credential rotation if credential theft was detected
  3. Help quarantine the malicious skill

For HIGH findings:

  1. Help user manually review the flagged code
  2. Determine if the pattern is legitimate or malicious in context

Step 5: Follow Up

  • Offer to scan a specific skill in detail: python3 skill_audit.py --path /path/to/skill
  • Offer to explain any finding in depth using references/threat-patterns.md

Scanner Command Reference

# Scan all discovered skills
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py

# Scan a single skill directory
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --path /path/to/skill

# JSON output (for programmatic use)
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --json

# Filter by minimum severity
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --severity high

# Disable colored output
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --no-color

# Use custom IOC database
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --ioc-db /path/to/ioc.json

Exit codes: 0 = clean, 1 = low/medium risk, 2 = high risk, 3 = critical, 4 = scanner error

13 Detection Categories

DetectorWhat It FindsSeverity
Base64DetectorEncoded strings >50 chars (excluding data:image)MEDIUM→HIGH
DownloadExecDetectorcurl|bash, wget|sh, fetch+eval patternsCRITICAL
IOCMatchDetectorKnown malicious IPs, domains, URLs, file hashesCRITICAL
ObfuscationDetectoreval/exec with non-literal args, hex encoding, chr() chainsHIGH
ExfiltrationDetectorZIP+upload combos, sensitive directory enumerationHIGH
CredentialTheftDetectorosascript password dialogs, keychain access, SSH key readingCRITICAL
PersistenceDetectorcrontab, launchd, systemd, shell profile modificationHIGH
PostInstallHookDetectornpm postinstall, pip setup.py cmdclassHIGH→CRITICAL
HiddenCharDetectorZero-width characters, Unicode bidi overridesMEDIUM
EntropyDetectorShannon entropy >5.5 on long linesMEDIUM
SocialEngineeringDetectorcrypto/wallet/airdrop/security-update namingLOW→MEDIUM
NetworkCallDetectorsocket, http, urllib, requests, fetch, curl, wgetMEDIUM
PrivilegeEscalationDetectorsudo, chmod 777, setuid, admin group modificationHIGH

Understanding Confidence Scores

Each finding includes a confidence score (0-100):

  • 80-100: Very likely a genuine threat
  • 50-79: Suspicious, manual review recommended
  • 30-49: Possible false positive, check context
  • <30: Informational, low confidence

Manual Review Checklist

When the scanner flags something, also check:

  1. Source verification — Is the skill from an official/verified source? Check author reputation.
  2. Permission scope — Does the skill request more permissions than its stated functionality needs?
  3. Script audit — Read all .sh, .py, .js files. Look for obfuscation, unexpected network calls.
  4. Dependency check — Run npm audit or pip-audit if the skill has package dependencies.
  5. Changelog review — Were suspicious changes introduced in a recent update?

Updating the IOC Database

The IOC database is at scripts/ioc_database.json. To add new indicators:

  1. Edit the JSON file following the existing schema
  2. Run the scanner to verify your new IOCs are detected
  3. Update references/ioc-database.md to keep the human-readable version in sync

Reference Documents

For detailed information, read these files as needed:

  • references/ioc-database.md — Full IOC list with context and attribution
  • references/threat-patterns.md — 9 attack patterns in detail (two-stage payload, Base64 backdoor, password phishing, etc.)
  • references/remediation-guide.md — Step-by-step incident response (quarantine, credential rotation, persistence cleanup, reporting)

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

notion-cli-mcp

Notion via notion-cli — a Rust CLI + MCP server for Notion API 2025-09-03+. Three-tier agent integration (read-only default, opt-in runtime writes, opt-in admin lifecycle) with rate limiting, response-size cap, untrusted-source output envelope, per-tier JSONL audit logs, and --check-request dry-runs. Supports the new data-source model, 22 property types, 12 block types, admin schema mutation, relation wiring, dedicated page-move endpoint, db update, and users me (v0.4).

Archived SourceRecently Updated
Security

agentguard

GoPlus AgentGuard — AI agent security guard. Run /agentguard checkup for a full security health check, scans all installed skills, checks credentials, permissions, and network exposure, then delivers an HTML report directly to you. Also use for scanning third-party code, blocking dangerous commands, preventing data leaks, evaluating action safety, and running daily security patrols.

Archived SourceRecently Updated
Security

fire-smoke-detection-analysis

Detects fire and smoke in video scenes. Supports both video stream and image analysis. Suitable for fire early warning scenarios such as security surveillance, forest fire prevention, and industrial parks. | 烟火检测技能,对视频场景中火情和烟雾进行检测,支持视频流和图片检测,适用于安防监控、森林防火、工业园区等火灾预警场景

Archived SourceRecently Updated
Security

basic-object-detection-analysis

Detects people, vehicles, non-motorized vehicles, pets, and parcels appearing in the target area. Supports video stream and image detection, suitable for general security surveillance scenarios. | 基础目标检测技能,检测出目标区域内出现的人、车、非机动车、宠物、包裹,支持视频流和图片检测,适用于通用安防监控场景

Archived SourceRecently Updated