ClawSkillShield
Scanned@AbYousef739
npx machina-cli add skill @AbYousef739/clawskillshield --openclawClawSkillShield 🛡️
Local-first security scanner for OpenClaw/ClawHub skills.
What It Does
- Static analysis for security risks and malware patterns
- Detects:
- Hardcoded secrets (API keys, credentials, private keys)
- Risky imports (
os,subprocess,socket,ctypes) - Dangerous calls (
eval(),exec(),open()) - Obfuscation (base64 blobs, suspicious encoding)
- Hardcoded IPs
- Risk scoring (0–10) + detailed threat reports
- Quarantine high-risk skills automatically
Dual-Use Design
- CLI for humans: Quick safety checks before installing skills
- Agent API: Importable functions for autonomous agents/Moltbots to proactively scan and quarantine risky skills (essential post-ClawHavoc)
Quick Start
CLI (Humans)
pip install -e .
clawskillshield scan-local /path/to/skill
clawskillshield quarantine /path/to/skill
Python API (Agents)
from clawskillshield import scan_local, quarantine
threats = scan_local("/path/to/skill")
if risk_score < 4: # HIGH RISK
quarantine("/path/to/skill")
Zero Dependencies
Pure Python. No network calls. Runs entirely locally.
Why This Matters
ClawHavoc demonstrated how easily malicious skills can slip into the ecosystem. ClawSkillShield provides a trusted, open-source defense layer—audit the code, run offline, stay safe.
GitHub: https://github.com/AbYousef739/clawskillshield
License: MIT
Author: Ab Yousef
Contact: contact@clawskillshield.com
Overview
ClawSkillShield performs static analysis on OpenClaw/ClawHub skills to detect security risks and malware patterns. It identifies hardcoded secrets, risky imports, dangerous calls, obfuscation, and hardcoded IPs, then assigns a 0–10 risk score and produces detailed threat reports. High-risk skills are quarantined automatically to protect the ecosystem.
How This Skill Works
The scanner runs static analysis locally without network calls. It flags patterns like hardcoded credentials, risky imports (os, subprocess, socket, ctypes), dangerous calls (eval, exec, open), and obfuscation, and then computes a 0–10 risk score with a threat report. The tool offers a human-facing CLI and an importable Python API for autonomous agents to scan and quarantine.
When to Use It
- Before installing a new skill locally to prevent malware from entering your environment
- When auditing a batch of imported skills for security before deployment
- Prior to enabling autonomous agents (Moltbots) to ensure safe code execution
- After a ClawHavoc incident or suspected compromise to re-scan skills
- When you suspect obfuscated code, hardcoded secrets, or suspicious imports in a skill
Quick Start
- Step 1: pip install -e .
- Step 2: clawskillshield scan-local /path/to/skill
- Step 3: If threats are detected, run clawskillshield quarantine /path/to/skill
Best Practices
- Run a local static analysis before any installation
- Review the detailed threat reports and the 0–10 risk score
- Auto-quarantine anything scoring high risk to contain threats
- Keep ClawSkillShield up to date with the latest heuristics and signatures
- Combine automated results with manual code review for high-risk findings
Example Use Cases
- Detected hardcoded API keys in a skill prior to installation
- Flagged risky imports like os/subprocess in several skills
- Caught obfuscated base64 blobs indicating attempted concealment
- Identified hardcoded IPs in a skill contacting external services
- Quarantined a high-risk skill automatically after a threat score raised