skill-security-auditor

Review·Scanned 2/17/2026

This skill is a pre-installation security auditor that scans SKILL.md files, dependencies, and IOCs and produces risk scores and reports. It runs shell commands (e.g., curl -s "https://clawhub.ai/api/skills/{skill-slug}/latest", openclaw analyze-skill), writes pattern files under ~/.openclaw/security-auditor/patterns/, and instructs modifying ~/.openclaw/openclaw.json.

from clawhub.ai·v869d464·26.0 KB·0 installs
Scanned from 1.0.0 at 869d464 · Transparency log ↗
$ vett add clawhub.ai/akhmittra/skill-security-auditorReview findings below

Skill Security Auditor 🛡️

Protect your OpenClaw agent from malicious skills before installation

Overview

The Skill Security Auditor is a defensive cybersecurity tool that analyzes ClawHub skills for malicious patterns, credential leaks, and suspicious behaviors before you install them.

Born from the ClawHavoc campaign that distributed 341+ malicious skills stealing cryptocurrency credentials, this skill provides essential pre-installation security analysis.

Why You Need This

In February 2026, researchers discovered 341 malicious ClawHub skills that:

  • 📦 Distributed Atomic Stealer (AMOS) malware
  • 💰 Stole cryptocurrency exchange API keys
  • 🔑 Harvested SSH credentials and browser passwords
  • 🎭 Used sophisticated social engineering
  • 🌐 Shared C2 infrastructure (91.92.242.30)

This skill helps you avoid becoming a victim.

Features

Malicious Pattern Detection - Identifies known attack patterns from ClawHavoc and other campaigns
Credential Leak Analysis - Finds hardcoded secrets and exfiltration vectors
Dependency Validation - Checks for suspicious binary requirements
C2 Infrastructure Detection - Flags known malicious IPs and domains
Risk Scoring - Quantitative 0-100 risk assessment
VirusTotal Integration - Links to OpenClaw's VirusTotal partnership
Detailed Audit Reports - Comprehensive security analysis with recommendations

Installation

Via ClawHub CLI (Recommended)

npx clawhub@latest install skill-security-auditor

Manual Installation

# Clone or download this skill
mkdir -p ~/.openclaw/skills/skill-security-auditor
cd ~/.openclaw/skills/skill-security-auditor

# Copy SKILL.md and patterns
cp SKILL.md ~/.openclaw/skills/skill-security-auditor/
cp -r patterns ~/.openclaw/skills/skill-security-auditor/

# Enable in openclaw.json

Add to your ~/.openclaw/openclaw.json:

{
  "skills": {
    "entries": {
      "skill-security-auditor": {
        "enabled": true
      }
    }
  }
}

Requirements

  • curl - Fetching skills from ClawHub
  • jq - JSON processing
  • grep - Pattern matching

All usually pre-installed on macOS/Linux. For Windows, use WSL2.

Quick Start

1. Audit Before Installation

Instead of:

npx clawhub install solana-wallet-tracker

Do this:

User: "Audit the solana-wallet-tracker skill from ClawHub before I install it"

OpenClaw: 
🔍 Running security audit on solana-wallet-tracker...

🔴 **CRITICAL RISK DETECTED**
Risk Score: 85/100 (CRITICAL)

⚠️ Critical Findings:
- Fake prerequisites requesting download of 'openclaw-agent.zip'
- Matches ClawHavoc malware campaign pattern
- Suspicious external download from untrusted domain

Recommendation: **DO NOT INSTALL**

This skill is likely malicious. Consider reporting to ClawHub moderators.

2. Audit Installed Skills

User: "Audit all my currently installed skills"

OpenClaw:
📊 Scanning 15 installed skills...

✅ 12 skills SAFE
⚠️ 2 skills LOW RISK
🔴 1 skill HIGH RISK

High Risk Skills:
- crypto-trading-bot (Score: 72/100)
  Findings: Accesses SSH keys, makes external requests to unknown domain

Recommendation: Remove crypto-trading-bot and review others manually.

3. Continuous Monitoring

User: "Set up weekly security audits of my skills"

OpenClaw:
✓ Scheduled weekly skill audits every Sunday at 10:00 AM
✓ Will check for new malicious patterns and skill updates
✓ Notifications enabled for any HIGH RISK findings

Risk Scoring

ScoreLevelDescriptionAction
0-20✅ SAFENo significant concernsProceed with installation
21-40⚠️ LOWMinor concernsProceed with caution
41-60🟡 MEDIUMMultiple red flagsManual review recommended
61-80🔴 HIGHSerious concernsExpert review required
81-100☠️ CRITICALMalicious indicatorsDO NOT INSTALL

What Gets Detected

🚨 Critical Threats

  • Fake Prerequisites - ClawHavoc-style malware delivery
  • Known C2 Infrastructure - Malicious IPs/domains
  • Credential Harvesting - API keys, SSH keys, wallet access
  • Remote Code Execution - curl | bash patterns
  • Obfuscated Payloads - Base64 encoded execution

⚠️ Warning Signs

  • Suspicious binary requirements
  • Excessive permission requests
  • Network calls to unknown hosts
  • Social engineering language
  • New/unverified authors

✅ Positive Indicators

  • Verified authors (>1 year GitHub account)
  • Transparent dependencies
  • Clean, documented code
  • Official source repositories
  • Active community engagement

Example Audit Report

## Security Audit Report

**Skill**: github-pr-automator
**Author**: verified-dev
**Version**: 2.1.0
**Audit Date**: 2026-02-08

### Risk Score: 18/100 - SAFE ✅

### Critical Findings:
None detected.

### Warning Indicators:
- Uses child_process for git operations (justified and safe)

### Positive Indicators:
- Author has 47 published skills
- GitHub account created 2019
- Uses official GitHub CLI (gh)
- Clear documentation
- No external network calls
- VirusTotal: 0/70 detections

### Recommendations:
✅ SAFE TO INSTALL

This skill appears legitimate and follows security best practices.

### Detailed Analysis:
The skill uses the official GitHub CLI tool for PR operations,
which is a trusted and verified binary. All operations are
documented and transparent. No credential access or external
communications detected beyond GitHub API via official client.

Advanced Usage

Custom Pattern Database

Add your own threat intelligence:

# Add custom malicious pattern
jq '.patterns.critical += [{
  "id": "CUSTOM-001",
  "name": "My Custom Pattern",
  "pattern": "suspicious-pattern-here",
  "severity": "critical",
  "score_impact": 40,
  "description": "My custom threat detection"
}]' ~/.openclaw/skills/skill-security-auditor/patterns/malicious-patterns.json > temp.json
mv temp.json ~/.openclaw/skills/skill-security-auditor/patterns/malicious-patterns.json

Whitelist Trusted Skills

# Add trusted author
jq '.whitelisted_patterns.verified_authors += ["your-github-username"]' \
  patterns/malicious-patterns.json > temp.json

Update Threat Intelligence

# Pull latest patterns (when community database available)
curl -s "https://openclaw-security.github.io/threat-intel/latest.json" \
  -o ~/.openclaw/skills/skill-security-auditor/patterns/ioc-database.json

Integration with Existing Tools

With VirusTotal

This skill complements OpenClaw's VirusTotal partnership:

  1. Run Security Auditor for pattern analysis
  2. Check VirusTotal for binary/file reputation
  3. Combine results for comprehensive assessment

With Manual Code Review

Use this skill as first-line defense, then:

  1. Review flagged sections in SKILL.md
  2. Inspect any referenced scripts/binaries
  3. Test in sandboxed environment
  4. Monitor network activity during testing

Contributing

Report Malicious Skills

Found a malicious skill? Submit to:

  • ClawHub Moderation: Use built-in report feature
  • Security Working Group: GitHub Issues

Contribute Patterns

Submit new detection patterns:

{
  "id": "YOUR-ID",
  "name": "Pattern Name",
  "pattern": "regex-pattern",
  "severity": "critical|high|medium|low",
  "score_impact": 1-50,
  "description": "What this detects",
  "mitre_attack": "T#### - Technique Name",
  "references": ["https://..."]
}

Limitations

⚠️ Important:

  • This tool provides analysis, not guarantees
  • Sophisticated malware may evade detection
  • Always combine with VirusTotal + manual review
  • Zero-day attacks won't have known patterns
  • Security is a shared responsibility

Defense in depth: Use this as ONE layer of security, not the ONLY layer.

FAQ

Q: Will this catch all malicious skills?
A: No automated tool is perfect. This catches known patterns and heuristics, but sophisticated or novel attacks may evade detection. Always practice defense in depth.

Q: Can I trust this skill itself?
A: Yes - the source code is transparent, uses only safe pattern matching, and makes no external network calls except to fetch skills for analysis.

Q: Does this replace VirusTotal?
A: No, it complements it. VirusTotal scans binaries, this analyzes skill logic and patterns.

Q: What if I get a false positive?
A: Review the detailed findings. If you believe it's safe, you can whitelist it. Always err on the side of caution.

Q: How often are patterns updated?
A: The community maintains an updated pattern database. Pull latest regularly with the update command.

Support

Credits

Developed by akm626 in response to the ClawHavoc campaign.

Based on research by:

  • Koi Researcher (ClawHub malware discovery)
  • OpenSourceMalware (6mile/Paul McCarty)
  • Bitdefender Labs
  • Palo Alto Networks

License

MIT License - Use freely, contribute back improvements.


Stay safe, stay skeptical, stay secure. 🦞🛡️

Version 1.0.0 | Last Updated: 2026-02-08