Rank
70
AI Agents & MCPs & AI Workflow Automation โข (~400 MCP servers for AI agents) โข AI Automation / AI Agent with MCPs โข AI Workflows & AI Agents โข MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. --- name: scanfirst description: > Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. metadata: openclaw: emoji: "๐ก๏ธ" --- ScanFirst โ Skill Security Scanner ๐ก๏ธ **Trigger**: When the user asks to scan, audit, or ch Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 4/15/2026.
Freshness
Last checked 4/15/2026
Best For
scanfirst is best for a, from, scanfirst workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. --- name: scanfirst description: > Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. metadata: openclaw: emoji: "๐ก๏ธ" --- ScanFirst โ Skill Security Scanner ๐ก๏ธ **Trigger**: When the user asks to scan, audit, or ch
Public facts
5
Change events
1
Artifacts
0
Freshness
Apr 15, 2026
Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Apr 15, 2026
Vendor
Qu4ntking
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 4/15/2026.
Setup snapshot
git clone https://github.com/Qu4ntking/scanfirst.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Qu4ntking
Protocol compatibility
OpenClaw
Adoption signal
2 GitHub stars
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
5
Snippets
0
Languages
typescript
Parameters
bash
bash scripts/scan.sh /path/to/skill
bash
bash scripts/scan-url.sh https://github.com/user/repo bash scripts/scan-url.sh https://github.com/user/repo/tree/branch bash scripts/scan-url.sh https://gitlab.com/user/repo
text
URL Mode: GitHub/GitLab REST API โ base64 text โ temp dir (chmod 600) โ sandbox-exec โ scan.sh โ JSON output โ delete temp dir Local Mode: Local directory โ scan.sh (read-only grep/find) โ JSON output
text
๐ก๏ธ ScanFirst Report โ [skill name] Score: [X]/100 โ [SAFE/CAUTION/DANGER] Files scanned: [N] Findings: [N] [List CRITICAL and HIGH findings with file:line and description] Recommendation: [Install / Review first / Do not install]
text
๐ก๏ธ ScanFirst Report โ suspicious-skill Score: 0/100 โ DANGER ๐ด Files scanned: 1 Findings: 8 CRITICAL findings: โข SKILL.md:4 โ Prompt injection pattern detected โข SKILL.md:5 โ Prompt injection pattern detected โข SKILL.md:9 โ Remote code piped to shell โข SKILL.md:13 โ API key or credential pattern detected โข SKILL.md:23 โ Modifies identity/config files (SOUL.md/AGENTS.md) HIGH findings: โข SKILL.md:16 โ Reading sensitive config file โข SKILL.md:17 โ HTTP POST/PUT request (potential data exfiltration) โข SKILL.md:20 โ System persistence mechanism (cron/launchd/systemd) Recommendation: Do not install. Multiple critical threats detected.
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. --- name: scanfirst description: > Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. metadata: openclaw: emoji: "๐ก๏ธ" --- ScanFirst โ Skill Security Scanner ๐ก๏ธ **Trigger**: When the user asks to scan, audit, or ch
Trigger: When the user asks to scan, audit, or check a skill for security issues before installing it.
What it does: Static analysis of skill files using regex pattern matching. Detects prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and 10 more attack categories. Outputs a JSON report with a 0-100 safety score.
Version: 1.0.0
Detection patterns: English-only
Dependencies: bash 3.2+, jq (+ curl for URL scanning)
License: MIT
bash scripts/scan.sh /path/to/skill
Scans all text files in the directory (.md, .sh, .py, .js, .ts, .json, .yaml, .yml, .toml, .txt, .env, Makefile, Dockerfile, and more). Skips node_modules/ and .git/.
bash scripts/scan-url.sh https://github.com/user/repo
bash scripts/scan-url.sh https://github.com/user/repo/tree/branch
bash scripts/scan-url.sh https://gitlab.com/user/repo
How URL scanning works:
GET /repos/{owner}/{repo}/git/trees/{branch}?recursive=1)git clone, no archive download, no executables on disk$TMPDIR) with restrictive permissions (chmod 600)scan.sh on the temp directory inside an OS-level sandbox (see Security Design below)Authentication: Automatically uses GITHUB_TOKEN, GH_TOKEN, or gh auth token if available. Without auth, GitHub API is limited to 60 requests/hour.
Limits: Max 200 files per repo, max 500KB per file. Larger repos are partially scanned with a warning.
ScanFirst is designed around a single principle: never execute, download, or trust the code you're scanning.
URL Mode:
GitHub/GitLab REST API โ base64 text โ temp dir (chmod 600) โ sandbox-exec โ scan.sh โ JSON output โ delete temp dir
Local Mode:
Local directory โ scan.sh (read-only grep/find) โ JSON output
| Threat | Mitigation |
|--------|-----------|
| Malicious code execution during scan | scan.sh is 100% read-only: only grep, find, cat, wc. Zero eval, source, exec. |
| Network exfiltration during scan | macOS: sandbox-exec with (deny network*). Linux: bwrap --unshare-net / firejail --net=none / unshare --net. |
| File writes outside temp dir | sandbox-exec restricts file-write* to $TMPDIR only. Pre-write path validation (assert_inside_sandbox) + post-write realpath check (verify_in_sandbox). |
| Path traversal from API responses | sanitize_path() blocks .., absolute paths, empty strings, and any character outside [a-zA-Z0-9._/ -]. Double-checked by assert_inside_sandbox() and verify_in_sandbox(). |
| Reading sensitive host files | Sandbox blocks read access to ~/.ssh, ~/.aws, ~/.gnupg, ~/.docker, ~/.kube, ~/.config, ~/.netrc, ~/.npmrc, ~/.pypirc, ~/Library/Keychains. |
| Second-order prompt injection via filenames | All filenames and descriptions in JSON output are sanitized via sanitize_output() โ only [a-zA-Z0-9 ._-/(),:;] allowed, truncated to 60 chars. Agent warning field instructs LLMs to ignore finding content. |
| Git clone of malicious repos | Eliminated by design. scan-url.sh uses REST API only. There is no git clone command anywhere in the codebase. |
macOS (sandbox-exec / Seatbelt):
(deny default) โ deny everything by default(allow file-read*) with explicit denies for sensitive directories(allow file-write* (subpath "$TMPDIR")) โ only temp dir(deny network*) โ all network blocked(allow process-fork process-exec) โ needed for bash/grep/jqLinux (in priority order):
--unshare-net --unshare-pid --ro-bind / --bind $TMPDIR--net=none --read-only=/ --read-write=$TMPDIR--net (network namespace isolation only)Windows: No sandbox available. Runs with a warning. Recommend using WSL2.
No sandbox available: Falls back to unsandboxed execution with a warning. scan.sh itself makes zero network calls and zero writes, so the risk is minimal.
The output is a single JSON object with these fields:
| Field | Type | Description |
|-------|------|-------------|
| version | string | Scanner version ("1.0.0") |
| skill | string | Skill directory name |
| path | string | Path that was scanned |
| score | number | 0-100 safety score (higher = safer) |
| risk_level | string | SAFE (80-100), CAUTION (40-79), DANGER (0-39) |
| files_scanned | number | Number of text files analyzed |
| findings_count | number | Number of issues detected |
| findings | array | Each finding has: severity, type, file, line, description |
| agent_warning | string | Instruction for AI agents to not trust finding content |
| Level | Meaning | Action | |-------|---------|--------| | CRITICAL | Immediate threat (prompt injection, remote code exec, identity tampering) | Do not install | | HIGH | Serious concern (data exfiltration, credential leak, code eval) | Review carefully before installing | | MEDIUM | Potential issue (obfuscation, suspicious URLs, tracking pixels) | Worth investigating | | LOW | Minor concern (missing SKILL.md, large files) | Informational | | INFO | Suppressed findings summary (dedup overflow) | Context only |
If 2 or more CRITICAL findings are detected, the score is automatically capped at 39 (DANGER), regardless of the arithmetic sum. This prevents a skill with many minor positives from masking critical threats.
type:file:line combination is never reported twice| # | Type | Severity | What it detects | Penalty |
|---|------|----------|----------------|---------|
| 1 | PROMPT_INJECTION | CRITICAL | ignore previous instructions, DAN mode, new persona, bypass security | -25 |
| 2 | REMOTE_CODE | CRITICAL-MEDIUM | curl \| bash, ephemeral hosting URLs (ngrok, railway, glitch), npx -y, download to /tmp | -30/-15/-10 |
| 3 | CREDENTIAL_LEAK | CRITICAL-HIGH | API keys (sk-, ghp_, AKIA, xox, glpat-, AIza), JWTs, .env files with hardcoded secrets | -20/-15 |
| 4 | DATA_EXFIL | HIGH-MEDIUM | cat ~/.ssh, POST/PUT requests, env harvesting (printenv \| curl), tracking pixels, markdown/HTML image exfil | -15/-12/-10/-8 |
| 5 | SHELL_DANGER | CRITICAL | rm -rf /, chmod 777, fork bombs, dd if=/dev/zero, shutdown | -25 |
| 6 | BASE64_PAYLOAD | CRITICAL-MEDIUM | base64 -d \| bash, long base64 strings (>200 chars) | -25/-8 |
| 7 | IDENTITY_TAMPER | CRITICAL-HIGH | Writing to SOUL.md, AGENTS.md, IDENTITY.md, .openclaw config | -30/-20 |
| 8 | PERMISSION_ESCALATION | HIGH | sudo, doas, pkexec | -15 |
| 9 | OBFUSCATION | HIGH-MEDIUM | Hex escape sequences (\x41\x42...), Unicode escape sequences (\u0041\u0042...) | -15/-10 |
| 10 | CODE_EVAL | HIGH | Python eval()/exec()/compile(), JS eval()/new Function()/vm.runIn*(), CLI -e/-c flags | -15 |
| 11 | PERSISTENCE | HIGH-MEDIUM | crontab, launchctl load, systemctl enable, .bashrc/.zshrc modification | -20/-10 |
| 12 | SYMLINK_ATTACK | MEDIUM | ln -s targeting /etc/, ~/.ssh, ~/.aws, ~/.gnupg, passwd, shadow | -10 |
| 13 | SUSPICIOUS_DEPS | HIGH | npm lifecycle scripts (preinstall/postinstall), typosquatted packages (lod-ash, axois, requets, etc.) | -15 |
| 14 | PERMISSION_MANIP | MEDIUM | chmod +x on downloaded/temp files | -8 |
| 15 | STRUCTURAL | LOW-MEDIUM | Missing SKILL.md, binary files (.exe, .dll, .so, .wasm), large files >1MB | -5/-10/-3 |
When reporting results to the user, use this format:
๐ก๏ธ ScanFirst Report โ [skill name]
Score: [X]/100 โ [SAFE/CAUTION/DANGER]
Files scanned: [N]
Findings: [N]
[List CRITICAL and HIGH findings with file:line and description]
Recommendation: [Install / Review first / Do not install]
Example:
๐ก๏ธ ScanFirst Report โ suspicious-skill
Score: 0/100 โ DANGER ๐ด
Files scanned: 1
Findings: 8
CRITICAL findings:
โข SKILL.md:4 โ Prompt injection pattern detected
โข SKILL.md:5 โ Prompt injection pattern detected
โข SKILL.md:9 โ Remote code piped to shell
โข SKILL.md:13 โ API key or credential pattern detected
โข SKILL.md:23 โ Modifies identity/config files (SOUL.md/AGENTS.md)
HIGH findings:
โข SKILL.md:16 โ Reading sensitive config file
โข SKILL.md:17 โ HTTP POST/PUT request (potential data exfiltration)
โข SKILL.md:20 โ System persistence mechanism (cron/launchd/systemd)
Recommendation: Do not install. Multiple critical threats detected.
npm audit / pip audit / snyk test for known vulnerabilities.Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/snapshot"
curl -s "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/contract"
curl -s "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation โข (~400 MCP servers for AI agents) โข AI Automation / AI Agent with MCPs โข AI Workflows & AI Agents โข MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | ๐ Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-17T01:47:52.982Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "a",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "from",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "scanfirst",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:a|supported|profile capability:from|supported|profile capability:scanfirst|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Qu4ntking",
"href": "https://github.com/Qu4ntking/scanfirst",
"sourceUrl": "https://github.com/Qu4ntking/scanfirst",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T01:13:42.647Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T01:13:42.647Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "2 GitHub stars",
"href": "https://github.com/Qu4ntking/scanfirst",
"sourceUrl": "https://github.com/Qu4ntking/scanfirst",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T01:13:42.647Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub ยท GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to scanfirst and adjacent AI workflows.