Skip to content

Skill Auditor

Verified

Security audit and quarantine system for third-party OpenClaw skills. Use when evaluating, reviewing, or installing any skill from ClawHub or external source...

235 downloads
$ Add to .claude/skills/

About This Skill

# Skill Auditor

Security gatekeeper for third-party skill installation. No skill gets installed without passing audit.

When to Use

  • Before installing ANY skill from ClawHub or external sources
  • When asked to review/evaluate a skill's safety
  • When `clawhub install` or similar installation is requested

Audit Workflow

1. Quarantine First Never copy a skill directly to the production skills directory. Always quarantine first:

```bash bash skills/skill-auditor/scripts/quarantine.sh /path/to/skill-source ```

This copies the skill to a temp directory, runs the full audit, and only allows installation if the risk score is CLEAN or LOW.

2. Manual Audit (Python Script Directly) For inspection without the quarantine wrapper:

```bash python3 skills/skill-auditor/scripts/audit_skill.py /path/to/skill-dir ```

Outputs JSON report to stdout. Add `--human` for formatted text output.

3. Interpreting Results

| Rating | Action | |--------|--------| | CLEAN | Safe to install | | LOW | Safe, minor notes — review findings briefly | | MEDIUM | Do NOT install without manual review of each finding | | HIGH | Block installation — likely malicious patterns detected | | CRITICAL | Block immediately — active threat indicators (exfil, prompt injection, obfuscated payloads) |

4. Exit Codes - `0` = CLEAN or LOW (safe) - `1` = MEDIUM (needs review) - `2` = HIGH or CRITICAL (blocked)

What Gets Scanned

  • All files: inventory, sizes, suspicious file types
  • Code: shell commands, network calls, env access, filesystem escape, obfuscation, dynamic imports
  • SKILL.md: prompt injection patterns, permission scope requests
  • Dependencies: requirements.txt / package.json flagged packages
  • Encoding: base64 payloads, hex/unicode escapes, string manipulation tricks

References

  • `references/known-patterns.md` — catalog of real attack patterns from ClawHub
  • `references/prompt-injection-patterns.md` — prompt injection signatures to detect

Important

If a skill scores MEDIUM or above, always show Abidi the full findings before taking any action. Never override or bypass the auditor. This is the last line of defense before untrusted code enters the system.

Use Cases

  • Audit third-party OpenClaw skills for malicious code before installing them
  • Quarantine untrusted skill packages in a sandbox to prevent production contamination
  • Scan skill files for prompt injection, data exfiltration, and obfuscated payloads
  • Review dependency lists in requirements.txt or package.json for known risky packages
  • Generate security risk reports with severity ratings to inform install/reject decisions

Pros & Cons

Pros

  • +Automated multi-layer scanning covers code, dependencies, prompts, and encoding tricks in one pass
  • +Clear risk rating system (CLEAN to CRITICAL) with actionable guidance for each level
  • +Quarantine-first approach ensures no untrusted code reaches production without review

Cons

  • -Cannot detect sophisticated zero-day attack patterns not yet in known-patterns catalog
  • -Static analysis only — does not execute skills in a sandbox to observe runtime behavior
  • -Requires manual review for MEDIUM-risk findings, which can slow down skill adoption

FAQ

What does Skill Auditor do?
Security audit and quarantine system for third-party OpenClaw skills. Use when evaluating, reviewing, or installing any skill from ClawHub or external source...
What platforms support Skill Auditor?
Skill Auditor is available on Claude Code, OpenClaw.
What are the use cases for Skill Auditor?
Audit third-party OpenClaw skills for malicious code before installing them. Quarantine untrusted skill packages in a sandbox to prevent production contamination. Scan skill files for prompt injection, data exfiltration, and obfuscated payloads.

100+ free AI tools

Writing, PDF, image, and developer tools — all in your browser.

Next Step

Use the skill detail page to evaluate fit and install steps. For a direct browser workflow, move into a focused tool route instead of staying in broader support surfaces.