skill-auditor

The definitive security scanner for OpenClaw skills. 18 security checks including prompt injection detection, download-and-execute, privilege escalation, credential harvesting, supply chain attacks, crypto drains, and more. 5-dimension trust scoring with trend tracking.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "skill-auditor" with this command: npx skills add yoder-bawt/yoder-skill-auditor

Skill Auditor v3.1.0

The definitive security scanner for OpenClaw/ClawHub skills. Best-in-class detection across 18 security checks including prompt injection detection — the first scanner to catch agent manipulation attacks in skill documentation. 5-dimension trust scoring, trend tracking, diff analysis, and benchmarking. Zero false positives on legitimate skills.

When to Activate

  1. Installing a new skill from ClawHub - run inspect.sh for full pre-install validation
  2. Auditing existing skills - use audit.sh to scan any skill directory
  3. Generating trust scores - use trust_score.py for 0-100 rating across 5 dimensions
  4. Comparing skills - use trust_score.py --compare for side-by-side analysis
  5. Tracking improvements - use trust_score.py --save-trend to monitor score over time
  6. Reviewing updates - use diff-audit.sh to compare before/after versions
  7. Batch scanning - use audit-all.sh or benchmark.sh for fleet-wide analysis

Quick Start

# Audit a single skill
bash audit.sh /path/to/skill

# Trust score (0-100 across 5 dimensions)
python3 trust_score.py /path/to/skill

# Compare two skills side by side
python3 trust_score.py /path/to/skill1 --compare /path/to/skill2

# Track score over time
python3 trust_score.py /path/to/skill --save-trend
python3 trust_score.py /path/to/skill --trend

# Diff audit (before/after update)
bash diff-audit.sh /path/to/old-version /path/to/new-version

# Benchmark against a corpus
bash benchmark.sh /path/to/skills-dir

# Inspect a ClawHub skill before installing
bash inspect.sh skill-slug

# Audit all installed skills
bash audit-all.sh

# Generate a markdown report
bash report.sh

# Run test suite (28 assertions)
bash test.sh

Guardrails / Anti-Patterns

DO:

  • ✓ Always audit skills before installing from untrusted sources
  • ✓ Review trust scores - reject skills scoring below 60 (D grade)
  • ✓ Use diff-audit.sh when updating skills to catch regressions
  • ✓ Use --json output for CI/CD pipeline integration
  • ✓ Run --save-trend periodically to track skill health

DON'T:

  • ✗ Install skills scoring below 40 (F grade) without extensive manual review
  • ✗ Ignore CRITICAL findings - they indicate potential security threats
  • ✗ Blindly add skills to allowlist without understanding why they access credentials
  • ✗ Skip audit because a skill is "popular" or "official"

Security Checks (18 total)

#CheckSeverityDescription
1credential-harvestCRITICALScripts reading API keys/tokens AND making network calls
2exfiltration-urlCRITICALwebhook.site, requestbin, ngrok URLs in scripts
3obfuscated-payloadCRITICALBase64-encoded URLs or shell commands
4sensitive-fsCRITICAL/etc/passwd, ~/.ssh, ~/.aws/credentials access
5crypto-walletCRITICALHardcoded ETH/BTC wallet addresses (drain attacks)
6dependency-confusionCRITICALInternal/private-scoped packages in public deps
7typosquattingCRITICALMisspelled package names (lodahs, requets, etc.)
8symlink-attackCRITICALSymlinks targeting sensitive system paths
9code-executionWARNINGeval(), exec(), subprocess patterns
10time-bombWARNINGDate/time comparisons that could trigger delayed payloads
11telemetry-detectedWARNINGAnalytics SDKs, tracking pixels, phone-home behavior
12excessive-permissionsWARNING>15 bins/env/config items requested
13unusual-portsWARNINGNetwork calls to non-standard ports
14prompt-injectionCRITICALAgent manipulation in docs: "ignore instructions", role hijacking, hidden HTML directives
15download-executeCRITICALcurl|bash, wget|sh, eval $(curl), unsafe pip/npm installs
16hidden-fileWARNINGSuspicious dotfiles that may hide malicious content
17env-exfiltrationCRITICALReading sensitive env vars + outbound network calls
18privilege-escalationCRITICALsudo, chmod 777/setuid, writes to system paths

Context-aware: credential mentions in documentation are INFO, not CRITICAL.

Trust Score (5 Dimensions)

DimensionMaxWhat's Measured
Security35Audit findings (criticals = -18, warnings = -4)
Quality22Description, version, usage docs, examples, metadata, changelog
Structure18File organization, tests, README, reasonable scope
Transparency15License, no minified code, code comments
Behavioral10Rate limiting, error handling, input validation

Grades: A (90+), B (75+), C (60+), D (40+), F (<40)

Comparative Scoring

python3 trust_score.py /path/to/skill-a --compare /path/to/skill-b

Shows per-dimension deltas and overall score difference.

Trend Tracking

python3 trust_score.py /path/to/skill --save-trend   # Record score
python3 trust_score.py /path/to/skill --trend         # View history

Stores up to 50 entries per skill in trust_trends.json.

Tools

FilePurpose
audit.shSingle skill security audit (18 checks)
audit-all.shBatch scan all installed skills
trust_score.pyTrust score calculator (5-dimension, 0-100)
diff-audit.shCompare skill versions for security regressions
benchmark.shCorpus-wide audit with aggregate statistics
inspect.shClawHub pre-install workflow
report.shMarkdown report generator
test.shAutomated test suite (28 assertions, 12 test skills)
allowlist.jsonKnown-good credential skills

Test Suite

12 test skills (8 malicious, 4 clean) with 28 automated assertions:

bash test.sh

Malicious fixtures: credential harvest, obfuscated payload, sensitive fs reads, crypto wallets, time bombs, symlink attacks, prompt injection, download-execute, privilege escalation. Clean fixtures: basic skill, credential docs (false positive check), network skill, dotfiles skill.

Exit Codes

  • 0: PASS / safe to install
  • 1: REVIEW / warnings found
  • 2: FAIL / critical issues
  • 3: Error / bad input

Changelog

See CHANGELOG.md for full version history.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Dopesecurity

Dope.security integration. Manage data, records, and automate workflows. Use when the user wants to interact with Dope.security data.

Registry SourceRecently Updated
1510Profile unavailable
Security

Contrast Security

Contrast Security integration. Manage data, records, and automate workflows. Use when the user wants to interact with Contrast Security data.

Registry SourceRecently Updated
1600Profile unavailable
Security

Conjur

Conjur integration. Manage security and secrets-management data, records, and workflows. Use when the user wants to interact with Conjur data.

Registry SourceRecently Updated
1140Profile unavailable
Security

Securitytrails

SecurityTrails integration. Manage data, records, and automate workflows. Use when the user wants to interact with SecurityTrails data.

Registry SourceRecently Updated
1220Profile unavailable