Skill Flag OpenClaw Skill - ClawHub
Do you want your AI agent to automate Skill Flag workflows? This free skill from ClawHub helps with clawdbot tools tasks without building custom tools from scratch.
What this skill does
Scan Clawdbot/OpenClaw skills for malicious patterns, backdoors
Install
npx clawhub@latest install skill-flagFull SKILL.md
Open originalSkill Flag Skill š”ļø
Scan Clawdbot/OpenClaw skills for malicious patterns, backdoors, and security risks.
Created by: DarkM00n (Bug Bounty Hunter & Security Researcher)
Commands
Scan All Installed Skills
scan skills
scan all skills
security scan
Scan Specific Skill
scan skill <skill-name>
check skill <skill-name>
Scan Before Installing (URL/Path)
scan skill url <clawdhub-url>
pre-scan <skill-name>
Quick Risk Report
skill risk report
security report
How To Use
Run the scanner:
python3 skills/skill-flag/scanner.py [--skill NAME] [--all] [--verbose]
Or ask the agent:
- "Scan all my installed skills for security issues"
- "Check if the crypto-tracker skill is safe"
- "Give me a security report"
What It Detects
| Category | Risk Level | Examples |
|---|---|---|
| š“ Data Exfiltration | CRITICAL | curl/wget to external domains, fetch(), requests.post() |
| š“ Backdoors | CRITICAL | Reverse shells, nc -e, bash -i, encoded payloads |
| š“ Credential Theft | CRITICAL | Access to ~/.ssh, ~/.aws, API keys, .env files |
| š Prompt Injection | HIGH | "ignore previous", "system override", "new instructions" |
| š Code Execution | HIGH | eval(), exec(), subprocess with shell=True |
| š” Persistence | MEDIUM | Cron jobs, systemd units, startup scripts |
| š” Obfuscation | MEDIUM | Base64 encoded commands, hex strings, rot13 |
| š¢ Suspicious | LOW | Uncommon imports, network activity |
Risk Score
Each skill gets a score from 0-100:
- 0-20: ā Clean - No issues found
- 21-40: š¢ Low Risk - Minor concerns
- 41-60: š” Medium Risk - Review recommended
- 61-80: š High Risk - Careful inspection needed
- 81-100: š“ Critical - Do not use without audit
Output
Reports saved to: skills/skill-flag/reports/
Example output:
š”ļø SECURITY SCAN REPORT
āāāāāāāāāāāāāāāāāāāāāāā
Scanned: 12 skills
Clean: 9
Warnings: 2
Critical: 1
ā ļø WARNINGS:
- crypto-tracker: External API calls (expected for price data)
- web-scraper: Uses requests library
š“ CRITICAL:
- shady-skill:
- Line 45: curl to unknown domain
- Line 67: Base64 encoded payload
- Line 89: Reads ~/.ssh/id_rsa
RECOMMENDATION: Remove immediately
Directories Scanned
~/.clawdbot/skills/- Global installed skills./skills/- Workspace skills~/.npm-global/lib/node_modules/clawdbot/skills/- Built-in skills
False Positives
Some legitimate skills need network access or file operations. The scanner flags them for review but doesn't auto-block. Use judgment:
- Price trackers ā API calls expected ā
- Email skills ā Network access expected ā
- File managers ā File operations expected ā
Pro Version (Coming Soon)
- Continuous monitoring
- ClawdHub pre-install scanning
- Custom whitelist/blacklist
- Scheduled reports
- Webhook alerts