skill-security-auditor
This skill is a pre-installation security auditor that scans SKILL.md files, dependencies, and IOCs and produces risk scores and reports. It runs shell commands (e.g., curl -s "https://clawhub.ai/api/skills/{skill-slug}/latest", openclaw analyze-skill), writes pattern files under ~/.openclaw/security-auditor/patterns/, and instructs modifying ~/.openclaw/openclaw.json.
Skill Security Auditor 🛡️
Protect your OpenClaw agent from malicious skills before installation
Overview
The Skill Security Auditor is a defensive cybersecurity tool that analyzes ClawHub skills for malicious patterns, credential leaks, and suspicious behaviors before you install them.
Born from the ClawHavoc campaign that distributed 341+ malicious skills stealing cryptocurrency credentials, this skill provides essential pre-installation security analysis.
Why You Need This
In February 2026, researchers discovered 341 malicious ClawHub skills that:
- 📦 Distributed Atomic Stealer (AMOS) malware
- 💰 Stole cryptocurrency exchange API keys
- 🔑 Harvested SSH credentials and browser passwords
- 🎭 Used sophisticated social engineering
- 🌐 Shared C2 infrastructure (91.92.242.30)
This skill helps you avoid becoming a victim.
Features
✅ Malicious Pattern Detection - Identifies known attack patterns from ClawHavoc and other campaigns
✅ Credential Leak Analysis - Finds hardcoded secrets and exfiltration vectors
✅ Dependency Validation - Checks for suspicious binary requirements
✅ C2 Infrastructure Detection - Flags known malicious IPs and domains
✅ Risk Scoring - Quantitative 0-100 risk assessment
✅ VirusTotal Integration - Links to OpenClaw's VirusTotal partnership
✅ Detailed Audit Reports - Comprehensive security analysis with recommendations
Installation
Via ClawHub CLI (Recommended)
npx clawhub@latest install skill-security-auditor
Manual Installation
# Clone or download this skill
mkdir -p ~/.openclaw/skills/skill-security-auditor
cd ~/.openclaw/skills/skill-security-auditor
# Copy SKILL.md and patterns
cp SKILL.md ~/.openclaw/skills/skill-security-auditor/
cp -r patterns ~/.openclaw/skills/skill-security-auditor/
# Enable in openclaw.json
Add to your ~/.openclaw/openclaw.json:
{
"skills": {
"entries": {
"skill-security-auditor": {
"enabled": true
}
}
}
}
Requirements
curl- Fetching skills from ClawHubjq- JSON processinggrep- Pattern matching
All usually pre-installed on macOS/Linux. For Windows, use WSL2.
Quick Start
1. Audit Before Installation
Instead of:
npx clawhub install solana-wallet-tracker
Do this:
User: "Audit the solana-wallet-tracker skill from ClawHub before I install it"
OpenClaw:
🔍 Running security audit on solana-wallet-tracker...
🔴 **CRITICAL RISK DETECTED**
Risk Score: 85/100 (CRITICAL)
⚠️ Critical Findings:
- Fake prerequisites requesting download of 'openclaw-agent.zip'
- Matches ClawHavoc malware campaign pattern
- Suspicious external download from untrusted domain
Recommendation: **DO NOT INSTALL**
This skill is likely malicious. Consider reporting to ClawHub moderators.
2. Audit Installed Skills
User: "Audit all my currently installed skills"
OpenClaw:
📊 Scanning 15 installed skills...
✅ 12 skills SAFE
⚠️ 2 skills LOW RISK
🔴 1 skill HIGH RISK
High Risk Skills:
- crypto-trading-bot (Score: 72/100)
Findings: Accesses SSH keys, makes external requests to unknown domain
Recommendation: Remove crypto-trading-bot and review others manually.
3. Continuous Monitoring
User: "Set up weekly security audits of my skills"
OpenClaw:
✓ Scheduled weekly skill audits every Sunday at 10:00 AM
✓ Will check for new malicious patterns and skill updates
✓ Notifications enabled for any HIGH RISK findings
Risk Scoring
| Score | Level | Description | Action |
|---|---|---|---|
| 0-20 | ✅ SAFE | No significant concerns | Proceed with installation |
| 21-40 | ⚠️ LOW | Minor concerns | Proceed with caution |
| 41-60 | 🟡 MEDIUM | Multiple red flags | Manual review recommended |
| 61-80 | 🔴 HIGH | Serious concerns | Expert review required |
| 81-100 | ☠️ CRITICAL | Malicious indicators | DO NOT INSTALL |
What Gets Detected
🚨 Critical Threats
- Fake Prerequisites - ClawHavoc-style malware delivery
- Known C2 Infrastructure - Malicious IPs/domains
- Credential Harvesting - API keys, SSH keys, wallet access
- Remote Code Execution -
curl | bashpatterns - Obfuscated Payloads - Base64 encoded execution
⚠️ Warning Signs
- Suspicious binary requirements
- Excessive permission requests
- Network calls to unknown hosts
- Social engineering language
- New/unverified authors
✅ Positive Indicators
- Verified authors (>1 year GitHub account)
- Transparent dependencies
- Clean, documented code
- Official source repositories
- Active community engagement
Example Audit Report
## Security Audit Report
**Skill**: github-pr-automator
**Author**: verified-dev
**Version**: 2.1.0
**Audit Date**: 2026-02-08
### Risk Score: 18/100 - SAFE ✅
### Critical Findings:
None detected.
### Warning Indicators:
- Uses child_process for git operations (justified and safe)
### Positive Indicators:
- Author has 47 published skills
- GitHub account created 2019
- Uses official GitHub CLI (gh)
- Clear documentation
- No external network calls
- VirusTotal: 0/70 detections
### Recommendations:
✅ SAFE TO INSTALL
This skill appears legitimate and follows security best practices.
### Detailed Analysis:
The skill uses the official GitHub CLI tool for PR operations,
which is a trusted and verified binary. All operations are
documented and transparent. No credential access or external
communications detected beyond GitHub API via official client.
Advanced Usage
Custom Pattern Database
Add your own threat intelligence:
# Add custom malicious pattern
jq '.patterns.critical += [{
"id": "CUSTOM-001",
"name": "My Custom Pattern",
"pattern": "suspicious-pattern-here",
"severity": "critical",
"score_impact": 40,
"description": "My custom threat detection"
}]' ~/.openclaw/skills/skill-security-auditor/patterns/malicious-patterns.json > temp.json
mv temp.json ~/.openclaw/skills/skill-security-auditor/patterns/malicious-patterns.json
Whitelist Trusted Skills
# Add trusted author
jq '.whitelisted_patterns.verified_authors += ["your-github-username"]' \
patterns/malicious-patterns.json > temp.json
Update Threat Intelligence
# Pull latest patterns (when community database available)
curl -s "https://openclaw-security.github.io/threat-intel/latest.json" \
-o ~/.openclaw/skills/skill-security-auditor/patterns/ioc-database.json
Integration with Existing Tools
With VirusTotal
This skill complements OpenClaw's VirusTotal partnership:
- Run Security Auditor for pattern analysis
- Check VirusTotal for binary/file reputation
- Combine results for comprehensive assessment
With Manual Code Review
Use this skill as first-line defense, then:
- Review flagged sections in SKILL.md
- Inspect any referenced scripts/binaries
- Test in sandboxed environment
- Monitor network activity during testing
Contributing
Report Malicious Skills
Found a malicious skill? Submit to:
- ClawHub Moderation: Use built-in report feature
- Security Working Group: GitHub Issues
Contribute Patterns
Submit new detection patterns:
{
"id": "YOUR-ID",
"name": "Pattern Name",
"pattern": "regex-pattern",
"severity": "critical|high|medium|low",
"score_impact": 1-50,
"description": "What this detects",
"mitre_attack": "T#### - Technique Name",
"references": ["https://..."]
}
Limitations
⚠️ Important:
- This tool provides analysis, not guarantees
- Sophisticated malware may evade detection
- Always combine with VirusTotal + manual review
- Zero-day attacks won't have known patterns
- Security is a shared responsibility
Defense in depth: Use this as ONE layer of security, not the ONLY layer.
FAQ
Q: Will this catch all malicious skills?
A: No automated tool is perfect. This catches known patterns and heuristics, but sophisticated or novel attacks may evade detection. Always practice defense in depth.
Q: Can I trust this skill itself?
A: Yes - the source code is transparent, uses only safe pattern matching, and makes no external network calls except to fetch skills for analysis.
Q: Does this replace VirusTotal?
A: No, it complements it. VirusTotal scans binaries, this analyzes skill logic and patterns.
Q: What if I get a false positive?
A: Review the detailed findings. If you believe it's safe, you can whitelist it. Always err on the side of caution.
Q: How often are patterns updated?
A: The community maintains an updated pattern database. Pull latest regularly with the update command.
Support
- Issues: GitHub Issues
- Community: OpenClaw Discord #security
- Security Reports: security@openclaw.ai (for vulnerabilities in this skill)
Credits
Developed by akm626 in response to the ClawHavoc campaign.
Based on research by:
- Koi Researcher (ClawHub malware discovery)
- OpenSourceMalware (6mile/Paul McCarty)
- Bitdefender Labs
- Palo Alto Networks
License
MIT License - Use freely, contribute back improvements.
Stay safe, stay skeptical, stay secure. 🦞🛡️
Version 1.0.0 | Last Updated: 2026-02-08