security-checkerSecurity scanner for Python skills before publishing to ClawHub. Use before publishing any skill to check for dangerous imports, hardcoded secrets, unsafe file operations, and dangerous functions like eval/exec/subprocess. Essential for maintaining trust and ensuring published skills are safe for others to install and run.
Install via ClawdBot CLI:
clawdbot install johstracke/security-checkerGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Potentially destructive shell commands in tool definitions
eval(Audited Apr 17, 2026 · audit v1.0
Generated Mar 21, 2026
Developers creating Python skills for ClawHub use this tool to scan their code before publishing, ensuring it doesn't contain dangerous imports, hardcoded secrets, or unsafe operations. This helps maintain trust and safety in the community by preventing malicious or vulnerable code from being distributed.
Open-source project maintainers integrate this scanner into their CI/CD pipelines to automatically check contributions for security risks like eval/exec usage or exposed secrets. It ensures code quality and reduces manual review effort, especially for projects with many contributors.
Instructors in coding bootcamps or university courses use this tool to teach students about common security pitfalls in Python, such as avoiding hardcoded API keys and dangerous functions. It provides practical, hands-on feedback to reinforce safe development habits.
Companies with internal skill development teams deploy this scanner to enforce security policies, ensuring all custom Python tools meet safety standards before deployment. It helps prevent data breaches and operational risks by flagging risky code patterns automatically.
Marketplace operators like ClawHub use this tool to vet submitted skills, scanning for vulnerabilities before listing them publicly. This builds user trust by ensuring all available skills are safe and reduces support issues related to malicious code.
Offer a basic version for free to attract users, with premium features like detailed reporting, integration with CI/CD tools, or advanced scanning for obfuscated code. Revenue comes from subscriptions for teams or enterprises needing enhanced security.
License the scanner to platforms like ClawHub or other AI marketplaces, where it's embedded as a mandatory pre-publish check. Revenue is generated through licensing fees based on usage volume or a flat annual rate for platform-wide integration.
Provide consulting services to organizations needing tailored security scans, such as adding custom rules for specific industries or integrating with proprietary systems. Revenue comes from project-based fees and ongoing support contracts.
💬 Integration Tip
Integrate the scanner into pre-commit hooks or CI pipelines to automate security checks, ensuring all code changes are scanned before merging or publishing.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.