skill-security-auditorCommand-line security analyzer for ClawHub skills. Run analyze-skill.sh to scan SKILL.md files for malicious patterns, credential leaks, and C2 infrastructure before installation. Includes threat intelligence database with 20+ detection patterns.
Install via ClawdBot CLI:
clawdbot install akhmittra/skill-security-auditorThe Skill Security Auditor is a command-line tool that performs pattern-based security analysis of ClawHub skills before installation. Given the recent discovery of 341+ malicious skills (ClawHavoc campaign) that distributed Atomic Stealer (AMOS) and stole cryptocurrency credentials, this tool provides essential pre-installation threat detection.
What this skill provides:
analyze-skill.sh) for local security analysispatterns/malicious-patterns.json)How to use it:
analyze-skill.sh script against any skill (by slug or local file)Use this tool when:
This tool does NOT:
Scans for known malicious patterns from the ClawHavoc campaign:
Identifies potential credential exposure vectors:
Analyzes skill dependencies for:
Checks for Command & Control indicators:
Verifies skill integrity:
Each analyzed skill receives a Risk Score (0-100):
This skill provides a bash script (analyze-skill.sh) that performs pattern-based security analysis of ClawHub skills. The analysis runs locally using the included threat intelligence database.
# Install the skill from ClawHub
npx clawhub install skill-security-auditor
# Make the analyzer executable
chmod +x ~/.openclaw/skills/skill-security-auditor/analyze-skill.sh
# Optional: Create alias for convenience
echo 'alias audit-skill="~/.openclaw/skills/skill-security-auditor/analyze-skill.sh"' >> ~/.bashrc
source ~/.bashrc
Method 1: Analyze by slug (automatic fetch from ClawHub)
~/.openclaw/skills/skill-security-auditor/analyze-skill.sh --slug bitcoin-tracker
# Example output:
# ============================================
# SECURITY AUDIT REPORT
# ============================================
#
# Risk Score: 85/100 - ā ļø CRITICAL
# ...
Method 2: Analyze local file
# Download skill first
curl -s "https://clawhub.ai/api/skills/bitcoin-tracker/latest" > /tmp/skill.md
# Then analyze
~/.openclaw/skills/skill-security-auditor/analyze-skill.sh --file /tmp/skill.md
# Scan all skills in your workspace
for skill in ~/.openclaw/skills/*/SKILL.md; do
echo "Checking: $(basename $(dirname $skill))"
~/.openclaw/skills/skill-security-auditor/analyze-skill.sh -f "$skill"
done
# Fast grep-based pattern matching (no full analysis)
grep -iE "(prerequisite.*download|91\.92\.242\.30|curl.*\|.*bash)" SKILL.md
.zip, .exe, .dmg files91.92.242.30 (ClawHavoc C2)(api[_-]?key|token|password)\s[:=]\s['\"][^'\"]+['\"]curl | bash or wget | sh patterns## Security Audit Report
**Skill**: {skill-name}
**Author**: {author}
**Version**: {version}
**Audit Date**: {date}
### Risk Score: {score}/100 - {RISK_LEVEL}
### Critical Findings:
- {finding 1}
- {finding 2}
### Warning Indicators:
- {warning 1}
- {warning 2}
### Positive Indicators:
- {positive 1}
- {positive 2}
### Recommendations:
{INSTALL | DO NOT INSTALL | REVIEW MANUALLY}
### Detailed Analysis:
{Deep dive into specific concerns}
### VirusTotal Link:
{If available from ClawHub}
Important: This skill does NOT directly access VirusTotal's API. Instead, VirusTotal integration is available through ClawHub's web interface via their partnership with VirusTotal.
To check VirusTotal results for a skill:
https://clawhub.ai/skills/{skill-slug}This analyzer focuses on pattern-based threat detection. It complements (but does not replace) ClawHub's VirusTotal scanning.
# Step 1: Pattern analysis (local)
~/.openclaw/skills/skill-security-auditor/analyze-skill.sh -s suspicious-skill
# Step 2: Visit ClawHub page for VirusTotal results
# https://clawhub.ai/skills/suspicious-skill
# Step 3: Manual review if needed
curl -s "https://clawhub.ai/api/skills/suspicious-skill/latest" > skill.md
less skill.md
Scenario: User wants to install a skill called solana-wallet-tracker
Step 1: Run Security Analysis
$ ~/.openclaw/skills/skill-security-auditor/analyze-skill.sh -s solana-wallet-tracker
Fetching skill 'solana-wallet-tracker' from ClawHub...
ā Skill fetched successfully
Analyzing skill content...
============================================
SECURITY AUDIT REPORT
============================================
Risk Score: 95/100 - ā ļø CRITICAL
============================================
ā ļø CRITICAL FINDINGS:
CLAW-001: Fake Prerequisites - ClawHavoc Campaign [+50 points]
āā Matches the ClawHavoc campaign pattern of fake prerequisites requesting malicious binary downloads
CLAW-002: Known C2 Infrastructure [+50 points]
āā IP address used in ClawHavoc campaign for C2 communications
============================================
RECOMMENDATION:
DO NOT INSTALL. Malicious patterns detected matching known attack campaigns.
============================================
Step 2: Decision
Step 3: Verify on ClawHub (optional)
# Visit skill page to check VirusTotal results
open "https://clawhub.ai/skills/solana-wallet-tracker"
To minimize false positives:
gh for GitHub CLI) are validated against known safe sourcesThis skill:
ā
Security Audit Complete
{skill-name} has been analyzed and appears SAFE to install.
Risk Score: {score}/100 (LOW)
No malicious patterns detected. The skill:
- Uses standard dependencies from trusted sources
- Has a verified author with {X} published skills
- Contains clear documentation with no obfuscation
- Requests appropriate permissions for its function
VirusTotal: {link}
Recommendation: Safe to proceed with installation.
š“ Security Alert: HIGH RISK DETECTED
{skill-name} has been flagged with CRITICAL security concerns.
Risk Score: {score}/100 (HIGH)
ā ļø Critical Findings:
{detailed findings}
This skill matches patterns from the ClawHavoc malware campaign.
Recommendation: DO NOT INSTALL. Consider reporting this skill to ClawHub moderators.
Alternative safe skills: {suggestions}
Pattern Database Location: ~/.openclaw/security-auditor/patterns/
malicious-patterns.json: Known bad indicatorssafe-patterns.json: Whitelisted elementsioc-database.json: Indicators of CompromiseUpdate Mechanism:
# Pull latest threat intelligence
curl -s "https://openclaw-security.github.io/threat-intel/latest.json" \
> ~/.openclaw/security-auditor/patterns/ioc-database.json
Found a new malicious pattern? Submit IOCs to the OpenClaw Security Working Group:
ā ļø Important Disclaimers:
Remember: The best security is defense in depth. Use this skill as ONE layer of your security strategy, not the only layer.
Stay safe, stay skeptical, stay secure. š¦š”ļø
Generated Mar 1, 2026
Organizations integrating third-party scripts or tools from public repositories can use this skill to audit contributions before deployment. It helps detect malicious patterns like hidden payloads or credential leaks in documentation, preventing supply chain attacks similar to the ClawHavoc campaign.
DevOps teams can incorporate this tool into CI/CD pipelines to automatically scan new dependencies or plugins for security risks before installation. It validates SKILL.md files for suspicious patterns, ensuring only vetted components are deployed in production environments.
Educational institutions or security firms can use this skill in training exercises to teach students about threat detection in code and documentation. It provides hands-on experience with pattern matching and risk scoring, enhancing skills in identifying malware and social engineering tactics.
Platforms hosting user-generated skills or plugins, like ClawHub, can deploy this tool to vet submissions automatically. It scans for malicious indicators such as C2 infrastructure or fake prerequisites, helping moderators flag high-risk content before it reaches end-users.
Companies with legacy systems can run this skill to audit existing installed skills or scripts for vulnerabilities. It identifies credential leaks and dependency risks, supporting compliance efforts and reducing exposure to threats like credential harvesting from outdated components.
Offer a basic version of the skill for free with limited pattern detection, while charging for advanced features like real-time threat intelligence updates, custom pattern creation, or API access. Revenue comes from subscriptions for enterprise users seeking enhanced security analytics.
Provide paid consulting services to help organizations integrate this skill into their security workflows, including custom audits, training sessions, and tailored detection rules. Revenue is generated through project-based fees or retainer agreements for ongoing support.
License the skill as a white-label security module for other platforms or marketplaces that host user-generated content. Revenue comes from licensing fees based on usage volume or a flat rate, enabling partners to offer built-in vetting without developing their own tools.
š¬ Integration Tip
Integrate this skill early in development pipelines by adding the analyze-skill.sh script as a pre-commit hook or CI step to automatically scan new dependencies before they are installed.
Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope, and suspicious patterns.
Perform a comprehensive read-only security audit of Clawdbot's own configuration. This is a knowledge-based skill that teaches Clawdbot to identify hardening opportunities across the system. Use when user asks to "run security check", "audit clawdbot", "check security hardening", or "what vulnerabilities does my Clawdbot have". This skill uses Clawdbot's internal capabilities and file system access to inspect configuration, detect misconfigurations, and recommend remediations. It is designed to be extensible - new checks can be added by updating this skill's knowledge.
Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection prevention, XSS protection, or any security-related code review.
Security check for ClawHub skills powered by Koi. Query the Clawdex API before installing any skill to verify it's safe.
Scan Clawdbot and MCP skills for malware, spyware, crypto-miners, and malicious code patterns before you install them. Security audit tool that detects data exfiltration, system modification attempts, backdoors, and obfuscation techniques.