Claim this agent
Agent DossierGITHUB OPENCLEWSafety 94/100

Xpersona Agent

skill-security-audit

Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies. --- name: skill-security-audit description: Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies. --- Skill Security Audit Detect malicious patterns in installed Claude and OpenClaw skills. Based on SlowMist's analysis of 472+ mali

OpenClaw · self-declared
8 GitHub starsTrust evidence available
git clone https://github.com/smartchainark/skill-security-audit.git

Overall rank

#35

Adoption

8 GitHub stars

Trust

Unknown

Freshness

Apr 15, 2026

Freshness

Last checked Apr 15, 2026

Best For

skill-security-audit is best for skills, a, all workflows where OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack

Overview

Key links, install path, reliability highlights, and the shortest practical read before diving into the crawl record.

Verifiededitorial-content

Overview

Executive Summary

Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies. --- name: skill-security-audit description: Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies. --- Skill Security Audit Detect malicious patterns in installed Claude and OpenClaw skills. Based on SlowMist's analysis of 472+ mali Capability contract not published. No trust telemetry is available yet. 8 GitHub stars reported by the source. Last updated 4/15/2026.

No verified compatibility signals8 GitHub stars

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Apr 15, 2026

Vendor

Smartchainark

Artifacts

0

Benchmarks

0

Last release

Unpublished

Install & run

Setup Snapshot

git clone https://github.com/smartchainark/skill-security-audit.git
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence & Timeline

Public facts grouped by evidence type, plus release and crawl events with provenance and freshness.

Verifiededitorial-content

Public facts

Evidence Ledger

Vendor (1)

Vendor

Smartchainark

profilemedium
Observed Apr 15, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

OpenClaw

contractmedium
Observed Apr 15, 2026Source linkProvenance
Adoption (1)

Adoption signal

8 GitHub stars

profilemedium
Observed Apr 15, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Artifacts & Docs

Parameters, dependencies, examples, extracted files, editorial overview, and the complete README when available.

Self-declaredGITHUB OPENCLEW

Captured outputs

Artifacts Archive

Extracted files

0

Examples

3

Snippets

0

Languages

typescript

Parameters

Executable Examples

bash

python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py

text

## Audit Summary
- Skills scanned: N
- Files scanned: N
- CRITICAL: N | HIGH: N | MEDIUM: N | LOW: N

## Critical/High Findings (if any)
For each finding:
- Skill name and file path
- What was detected and why it's dangerous
- Recommended action

## Medium/Low Findings (if any)
Brief summary, noting which are likely false positives

bash

# Scan all discovered skills
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py

# Scan a single skill directory
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --path /path/to/skill

# JSON output (for programmatic use)
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --json

# Filter by minimum severity
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --severity high

# Disable colored output
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --no-color

# Use custom IOC database
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --ioc-db /path/to/ioc.json

Editorial read

Docs & README

Docs source

GITHUB OPENCLEW

Editorial quality

ready

Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies. --- name: skill-security-audit description: Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies. --- Skill Security Audit Detect malicious patterns in installed Claude and OpenClaw skills. Based on SlowMist's analysis of 472+ mali

Full README

name: skill-security-audit description: Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies.

Skill Security Audit

Detect malicious patterns in installed Claude and OpenClaw skills. Based on SlowMist's analysis of 472+ malicious skills on ClawHub platform.

Triggers

Use this skill when the user mentions: 安全审计, security audit, skill 检查, 技能安全, scan skills, supply chain security, 扫描技能, 恶意检测, malicious skill, skill 安全扫描

Quick Audit Workflow

When the user requests a security audit, follow these 5 steps:

Step 1: Run the Scanner

python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py

This auto-discovers and scans all skills in:

  • ~/.claude/skills/
  • ~/.openclaw/workspace/skills/
  • Extra directories from ~/.openclaw/openclaw.jsonskills.load.extraDirs

Step 2: Analyze Results

Read the scanner output. Findings are grouped by skill and sorted by severity:

| Severity | Meaning | Action Required | |----------|---------|----------------| | CRITICAL | Known malicious IOC match, credential theft, or download-and-execute | Immediate removal and credential rotation | | HIGH | Obfuscation, persistence mechanisms, privilege escalation | Manual review required, likely malicious | | MEDIUM | Suspicious patterns (Base64, network calls, high entropy) | Review context — may be legitimate | | LOW | Social engineering naming, informational | Note for awareness |

Step 3: Report to User

Present findings in this format:

## Audit Summary
- Skills scanned: N
- Files scanned: N
- CRITICAL: N | HIGH: N | MEDIUM: N | LOW: N

## Critical/High Findings (if any)
For each finding:
- Skill name and file path
- What was detected and why it's dangerous
- Recommended action

## Medium/Low Findings (if any)
Brief summary, noting which are likely false positives

Step 4: Recommend Actions

For CRITICAL findings:

  1. Read references/remediation-guide.md for incident response steps
  2. Guide user through credential rotation if credential theft was detected
  3. Help quarantine the malicious skill

For HIGH findings:

  1. Help user manually review the flagged code
  2. Determine if the pattern is legitimate or malicious in context

Step 5: Follow Up

  • Offer to scan a specific skill in detail: python3 skill_audit.py --path /path/to/skill
  • Offer to explain any finding in depth using references/threat-patterns.md

Scanner Command Reference

# Scan all discovered skills
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py

# Scan a single skill directory
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --path /path/to/skill

# JSON output (for programmatic use)
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --json

# Filter by minimum severity
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --severity high

# Disable colored output
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --no-color

# Use custom IOC database
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --ioc-db /path/to/ioc.json

Exit codes: 0 = clean, 1 = low/medium risk, 2 = high risk, 3 = critical, 4 = scanner error

13 Detection Categories

| Detector | What It Finds | Severity | |----------|--------------|----------| | Base64Detector | Encoded strings >50 chars (excluding data:image) | MEDIUM→HIGH | | DownloadExecDetector | curl|bash, wget|sh, fetch+eval patterns | CRITICAL | | IOCMatchDetector | Known malicious IPs, domains, URLs, file hashes | CRITICAL | | ObfuscationDetector | eval/exec with non-literal args, hex encoding, chr() chains | HIGH | | ExfiltrationDetector | ZIP+upload combos, sensitive directory enumeration | HIGH | | CredentialTheftDetector | osascript password dialogs, keychain access, SSH key reading | CRITICAL | | PersistenceDetector | crontab, launchd, systemd, shell profile modification | HIGH | | PostInstallHookDetector | npm postinstall, pip setup.py cmdclass | HIGH→CRITICAL | | HiddenCharDetector | Zero-width characters, Unicode bidi overrides | MEDIUM | | EntropyDetector | Shannon entropy >5.5 on long lines | MEDIUM | | SocialEngineeringDetector | crypto/wallet/airdrop/security-update naming | LOW→MEDIUM | | NetworkCallDetector | socket, http, urllib, requests, fetch, curl, wget | MEDIUM | | PrivilegeEscalationDetector | sudo, chmod 777, setuid, admin group modification | HIGH |

Understanding Confidence Scores

Each finding includes a confidence score (0-100):

  • 80-100: Very likely a genuine threat
  • 50-79: Suspicious, manual review recommended
  • 30-49: Possible false positive, check context
  • <30: Informational, low confidence

Manual Review Checklist

When the scanner flags something, also check:

  1. Source verification — Is the skill from an official/verified source? Check author reputation.
  2. Permission scope — Does the skill request more permissions than its stated functionality needs?
  3. Script audit — Read all .sh, .py, .js files. Look for obfuscation, unexpected network calls.
  4. Dependency check — Run npm audit or pip-audit if the skill has package dependencies.
  5. Changelog review — Were suspicious changes introduced in a recent update?

Updating the IOC Database

The IOC database is at scripts/ioc_database.json. To add new indicators:

  1. Edit the JSON file following the existing schema
  2. Run the scanner to verify your new IOCs are detected
  3. Update references/ioc-database.md to keep the human-readable version in sync

Reference Documents

For detailed information, read these files as needed:

  • references/ioc-database.md — Full IOC list with context and attribution
  • references/threat-patterns.md — 9 attack patterns in detail (two-stage payload, Base64 backdoor, password phishing, etc.)
  • references/remediation-guide.md — Step-by-step incident response (quarantine, credential rotation, persistence cleanup, reporting)

API & Reliability

Machine endpoints, contract coverage, trust signals, runtime metrics, benchmarks, and guardrails for agent-to-agent use.

MissingGITHUB OPENCLEW

Machine interfaces

Contract & API

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

OpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/snapshot"
curl -s "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/contract"
curl -s "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/trust"

Operational fit

Reliability & Benchmarks

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Machine Appendix

Raw contract, invocation, trust, capability, facts, and change-event payloads for machine-side inspection.

MissingGITHUB OPENCLEW

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_OPENCLEW",
      "generatedAt": "2026-04-17T04:42:26.641Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "skills",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "a",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "all",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:skills|supported|profile capability:a|supported|profile capability:all|supported|profile"
}

Facts JSON

[
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Smartchainark",
    "href": "https://github.com/smartchainark/skill-security-audit",
    "sourceUrl": "https://github.com/smartchainark/skill-security-audit",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:21:22.124Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:21:22.124Z",
    "isPublic": true
  },
  {
    "factKey": "traction",
    "category": "adoption",
    "label": "Adoption signal",
    "value": "8 GitHub stars",
    "href": "https://github.com/smartchainark/skill-security-audit",
    "sourceUrl": "https://github.com/smartchainark/skill-security-audit",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:21:22.124Z",
    "isPublic": true
  },
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub · GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to skill-security-audit and adjacent AI workflows.