Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Xpersona Agent
Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies. --- name: skill-security-audit description: Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies. --- Skill Security Audit Detect malicious patterns in installed Claude and OpenClaw skills. Based on SlowMist's analysis of 472+ mali
git clone https://github.com/smartchainark/skill-security-audit.gitOverall rank
#35
Adoption
8 GitHub stars
Trust
Unknown
Freshness
Apr 15, 2026
Freshness
Last checked Apr 15, 2026
Best For
skill-security-audit is best for skills, a, all workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Key links, install path, reliability highlights, and the shortest practical read before diving into the crawl record.
Overview
Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies. --- name: skill-security-audit description: Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies. --- Skill Security Audit Detect malicious patterns in installed Claude and OpenClaw skills. Based on SlowMist's analysis of 472+ mali Capability contract not published. No trust telemetry is available yet. 8 GitHub stars reported by the source. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Apr 15, 2026
Vendor
Smartchainark
Artifacts
0
Benchmarks
0
Last release
Unpublished
Install & run
git clone https://github.com/smartchainark/skill-security-audit.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Public facts grouped by evidence type, plus release and crawl events with provenance and freshness.
Public facts
Vendor
Smartchainark
Protocol compatibility
OpenClaw
Adoption signal
8 GitHub stars
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Parameters, dependencies, examples, extracted files, editorial overview, and the complete README when available.
Captured outputs
Extracted files
0
Examples
3
Snippets
0
Languages
typescript
Parameters
bash
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py
text
## Audit Summary - Skills scanned: N - Files scanned: N - CRITICAL: N | HIGH: N | MEDIUM: N | LOW: N ## Critical/High Findings (if any) For each finding: - Skill name and file path - What was detected and why it's dangerous - Recommended action ## Medium/Low Findings (if any) Brief summary, noting which are likely false positives
bash
# Scan all discovered skills python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py # Scan a single skill directory python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --path /path/to/skill # JSON output (for programmatic use) python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --json # Filter by minimum severity python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --severity high # Disable colored output python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --no-color # Use custom IOC database python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --ioc-db /path/to/ioc.json
Editorial read
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies. --- name: skill-security-audit description: Detect malicious patterns in AI Agent skills — 13 detectors for backdoors, credential theft, data exfiltration, and supply-chain attacks. Based on SlowMist's ClawHub threat intelligence (472+ malicious skills). Pure Python, zero dependencies. --- Skill Security Audit Detect malicious patterns in installed Claude and OpenClaw skills. Based on SlowMist's analysis of 472+ mali
Detect malicious patterns in installed Claude and OpenClaw skills. Based on SlowMist's analysis of 472+ malicious skills on ClawHub platform.
Use this skill when the user mentions: 安全审计, security audit, skill 检查, 技能安全, scan skills, supply chain security, 扫描技能, 恶意检测, malicious skill, skill 安全扫描
When the user requests a security audit, follow these 5 steps:
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py
This auto-discovers and scans all skills in:
~/.claude/skills/~/.openclaw/workspace/skills/~/.openclaw/openclaw.json → skills.load.extraDirsRead the scanner output. Findings are grouped by skill and sorted by severity:
| Severity | Meaning | Action Required | |----------|---------|----------------| | CRITICAL | Known malicious IOC match, credential theft, or download-and-execute | Immediate removal and credential rotation | | HIGH | Obfuscation, persistence mechanisms, privilege escalation | Manual review required, likely malicious | | MEDIUM | Suspicious patterns (Base64, network calls, high entropy) | Review context — may be legitimate | | LOW | Social engineering naming, informational | Note for awareness |
Present findings in this format:
## Audit Summary
- Skills scanned: N
- Files scanned: N
- CRITICAL: N | HIGH: N | MEDIUM: N | LOW: N
## Critical/High Findings (if any)
For each finding:
- Skill name and file path
- What was detected and why it's dangerous
- Recommended action
## Medium/Low Findings (if any)
Brief summary, noting which are likely false positives
For CRITICAL findings:
references/remediation-guide.md for incident response stepsFor HIGH findings:
python3 skill_audit.py --path /path/to/skillreferences/threat-patterns.md# Scan all discovered skills
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py
# Scan a single skill directory
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --path /path/to/skill
# JSON output (for programmatic use)
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --json
# Filter by minimum severity
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --severity high
# Disable colored output
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --no-color
# Use custom IOC database
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --ioc-db /path/to/ioc.json
Exit codes: 0 = clean, 1 = low/medium risk, 2 = high risk, 3 = critical, 4 = scanner error
| Detector | What It Finds | Severity | |----------|--------------|----------| | Base64Detector | Encoded strings >50 chars (excluding data:image) | MEDIUM→HIGH | | DownloadExecDetector | curl|bash, wget|sh, fetch+eval patterns | CRITICAL | | IOCMatchDetector | Known malicious IPs, domains, URLs, file hashes | CRITICAL | | ObfuscationDetector | eval/exec with non-literal args, hex encoding, chr() chains | HIGH | | ExfiltrationDetector | ZIP+upload combos, sensitive directory enumeration | HIGH | | CredentialTheftDetector | osascript password dialogs, keychain access, SSH key reading | CRITICAL | | PersistenceDetector | crontab, launchd, systemd, shell profile modification | HIGH | | PostInstallHookDetector | npm postinstall, pip setup.py cmdclass | HIGH→CRITICAL | | HiddenCharDetector | Zero-width characters, Unicode bidi overrides | MEDIUM | | EntropyDetector | Shannon entropy >5.5 on long lines | MEDIUM | | SocialEngineeringDetector | crypto/wallet/airdrop/security-update naming | LOW→MEDIUM | | NetworkCallDetector | socket, http, urllib, requests, fetch, curl, wget | MEDIUM | | PrivilegeEscalationDetector | sudo, chmod 777, setuid, admin group modification | HIGH |
Each finding includes a confidence score (0-100):
When the scanner flags something, also check:
.sh, .py, .js files. Look for obfuscation, unexpected network calls.npm audit or pip-audit if the skill has package dependencies.The IOC database is at scripts/ioc_database.json. To add new indicators:
references/ioc-database.md to keep the human-readable version in syncFor detailed information, read these files as needed:
references/ioc-database.md — Full IOC list with context and attributionreferences/threat-patterns.md — 9 attack patterns in detail (two-stage payload, Base64 backdoor, password phishing, etc.)references/remediation-guide.md — Step-by-step incident response (quarantine, credential rotation, persistence cleanup, reporting)Machine endpoints, contract coverage, trust signals, runtime metrics, benchmarks, and guardrails for agent-to-agent use.
Machine interfaces
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/snapshot"
curl -s "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/contract"
curl -s "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/trust"
Operational fit
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Raw contract, invocation, trust, capability, facts, and change-event payloads for machine-side inspection.
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-17T04:42:26.641Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "skills",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "a",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "all",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:skills|supported|profile capability:a|supported|profile capability:all|supported|profile"
}Facts JSON
[
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Smartchainark",
"href": "https://github.com/smartchainark/skill-security-audit",
"sourceUrl": "https://github.com/smartchainark/skill-security-audit",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T05:21:22.124Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T05:21:22.124Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "8 GitHub stars",
"href": "https://github.com/smartchainark/skill-security-audit",
"sourceUrl": "https://github.com/smartchainark/skill-security-audit",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T05:21:22.124Z",
"isPublic": true
},
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/smartchainark-skill-security-audit/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to skill-security-audit and adjacent AI workflows.