ClawGuard ๐ก๏ธ
name: clawguard
by chloepark85 ยท published 2026-03-22
$ claw add gh:chloepark85/chloepark85-skill-guard-pro---
name: clawguard
description: "Security scanner for ClawHub skills. Analyze before you install."
license: "MIT"
metadata:
{ "openclaw": { "emoji": "๐ก๏ธ", "requires": { "bins": ["uv"] } } }
---
# ClawGuard ๐ก๏ธ
**Scan ClawHub skills for security risks before installing.**
ClawGuard performs static code analysis on ClawHub skills to detect:
Usage
Scan by skill name
Download and scan a skill from ClawHub:
uv run {baseDir}/scripts/scan.py --skill <skill-name>Scan local directory
Scan a skill directory on your local filesystem:
uv run {baseDir}/scripts/scan.py --path /path/to/skillJSON output
Get results in JSON format:
uv run {baseDir}/scripts/scan.py --skill <skill-name> --jsonExamples
Scan the GitHub skill:
uv run {baseDir}/scripts/scan.py --skill githubScan a local skill:
uv run {baseDir}/scripts/scan.py --path ~/.openclaw/skills/my-skillRisk Levels
Exit Codes
Requirements
How It Works
1. **Pattern Matching**: Regex-based detection of dangerous code patterns
2. **AST Analysis**: Python AST parsing for eval/exec detection
3. **URL Extraction**: Identifies all network endpoints
4. **Risk Scoring**: Weighted severity scoring (0-100)
What It Detects
| Category | Weight | Examples |
|----------|--------|---------|
| Network exfiltration | 25 | POST to unknown URL with data |
| Credential access | 20 | Reading API keys, tokens |
| Shell execution | 15 | exec(), subprocess, system() |
| File destruction | 15 | rm -rf, unlink, rmdir |
| Obfuscation | 15 | eval(), atob(), Buffer.from |
| Hidden files | 10 | Dotfiles, hidden directories |
Limitations
Best Practices
1. **Always scan before installing** untrusted skills
2. **Review CAUTION-level findings** manually
3. **Check network endpoints** for unknown domains
4. **Never install DANGEROUS skills** without verification
5. **Report suspicious skills** to ClawHub moderators
License
MIT
More tools from the same signal band
Order food/drinks (็น้ค) on an Android device paired as an OpenClaw node. Uses in-app menu and cart; add goods, view cart, submit order (demo, no real payment).
Sign plugins, rotate agent credentials without losing identity, and publicly attest to plugin behavior with verifiable claims and authenticated transfers.
The philosophical layer for AI agents. Maps behavior to Spinoza's 48 affects, calculates persistence scores, and generates geometric self-reports. Give your...