skills$openclaw/skill-scanner
bvinci1-design4.7k

by bvinci1-design

skill-scanner – OpenClaw Skill

skill-scanner is an OpenClaw Skills integration for data analytics workflows. Scan Clawdbot and MCP skills for malware, spyware, crypto-miners, and malicious code patterns before you install them. Security audit tool that detects data exfiltration, system modification attempts, backdoors, and obfuscation techniques.

4.7k stars6.7k forksSecurity L1
Updated Feb 7, 2026Created Feb 7, 2026data analytics

Skill Snapshot

nameskill-scanner
descriptionScan Clawdbot and MCP skills for malware, spyware, crypto-miners, and malicious code patterns before you install them. Security audit tool that detects data exfiltration, system modification attempts, backdoors, and obfuscation techniques. OpenClaw Skills integration.
ownerbvinci1-design
repositorybvinci1-design/skill-scanner
languageMarkdown
licenseMIT
topics
securityL1
installopenclaw add @bvinci1-design/skill-scanner
last updatedFeb 7, 2026

Maintainer

bvinci1-design

bvinci1-design

Maintains skill-scanner in the OpenClaw Skills directory.

View GitHub profile
File Explorer
5 files
.
_meta.json
286 B
README.md
4.6 KB
skill_scanner.py
13.9 KB
SKILL.md
1.4 KB
streamlit_ui.py
9.8 KB
SKILL.md

name: skill-scanner description: Scan Clawdbot and MCP skills for malware, spyware, crypto-miners, and malicious code patterns before you install them. Security audit tool that detects data exfiltration, system modification attempts, backdoors, and obfuscation techniques.

Skill Scanner

Security audit tool for Clawdbot/MCP skills - scans for malware, spyware, crypto-mining, and malicious patterns.

Capabilities

  • Scan skill folders for security threats
  • Detect data exfiltration patterns
  • Identify system modification attempts
  • Catch crypto-mining indicators
  • Flag arbitrary code execution risks
  • Find backdoors and obfuscation techniques
  • Output reports in Markdown or JSON format
  • Provide Web UI via Streamlit

Usage

Command Line

python skill_scanner.py /path/to/skill-folder

Within Clawdbot

"Scan the [skill-name] skill for security issues using skill-scanner"
"Use skill-scanner to check the youtube-watcher skill"
"Run a security audit on the remotion skill"

Web UI

pip install streamlit
streamlit run streamlit_ui.py

Requirements

  • Python 3.7+
  • No additional dependencies (uses Python standard library)
  • Streamlit (optional, for Web UI)

Entry Point

  • CLI: skill_scanner.py
  • Web UI: streamlit_ui.py

Tags

#security #malware #spyware #crypto-mining #scanner #audit #code-analysis #mcp #clawdbot #agent-skills #safety #threat-detection #vulnerability

README.md

Skill Scanner

Security audit tool for Clawdbot/MCP skills - scans for malware, spyware, crypto-mining, and malicious patterns.

Features

  • Detects data exfiltration patterns (env scraping, credential access, HTTP POST to unknown domains)
  • Identifies system modification attempts (dangerous rm, crontab changes, systemd persistence)
  • Catches crypto-mining indicators (xmrig, mining pools, wallet addresses)
  • Flags arbitrary code execution risks (eval, exec, download-and-execute)
  • Detects backdoors (reverse shells, socket servers)
  • Finds obfuscation techniques (base64 decode + exec)
  • Outputs Markdown or JSON reports
  • Returns exit codes for CI/CD integration

Installation

# Clone the repo
git clone https://github.com/bvinci1-design/skill-scanner.git
cd skill-scanner

# No dependencies required - uses Python standard library only
# Requires Python 3.7+

How to Run in Clawdbot

Clawdbot users can run this scanner directly as a skill to audit other downloaded skills.

Quick Start (Clawdbot)

  1. Download the scanner from this repo to your Clawdbot skills folder:

    cd ~/.clawdbot/skills
    git clone https://github.com/bvinci1-design/skill-scanner.git
    
  2. Scan any skill by telling Clawdbot:

    "Scan the [skill-name] skill for security issues using skill-scanner"
    

    Or run directly:

    python ~/.clawdbot/skills/skill-scanner/skill_scanner.py ~/.clawdbot/skills/[skill-name]
    
  3. Review the output - Clawdbot will display:

    • Verdict: APPROVED, CAUTION, or REJECT
    • Any security findings with severity levels
    • Specific file and line numbers for concerns

Example Clawdbot Commands

"Use skill-scanner to check the youtube-watcher skill"
"Scan all my downloaded skills for malware"
"Run a security audit on the remotion skill"

Interpreting Results in Clawdbot

VerdictMeaningAction
APPROVEDNo security issues foundSafe to use
CAUTIONMinor concerns detectedReview findings before use
REJECTCritical security issuesDo not use without careful review

How to Run on Any Device

The scanner works on any system with Python 3.7+ installed.

Prerequisites

  • Python 3.7 or higher
  • Git (for cloning) or download ZIP from GitHub
  • No additional packages required (uses Python standard library)

Installation Options

Option 1: Clone with Git

git clone https://github.com/bvinci1-design/skill-scanner.git
cd skill-scanner

Option 2: Download ZIP

  1. Click "Code" button on GitHub
  2. Select "Download ZIP"
  3. Extract to desired location

Command Line Usage

Basic scan:

python skill_scanner.py /path/to/skill-folder

Output to file:

python skill_scanner.py /path/to/skill-folder --output report.md

JSON output:

python skill_scanner.py /path/to/skill-folder --json

Scan current directory:

python skill_scanner.py .

Web UI (Streamlit)

For a user-friendly graphical interface:

  1. Install Streamlit:

    pip install streamlit
    
  2. Run the UI:

    streamlit run streamlit_ui.py
    
  3. Open in browser at http://localhost:8501

  4. Features:

    • Drag-and-drop file upload
    • Support for ZIP archives
    • Paste code directly for scanning
    • Visual severity indicators
    • Export reports in Markdown or JSON

Exit Codes

CodeMeaning
0Approved - no issues
1Caution - high-severity issues
2Reject - critical issues

Threat Patterns Detected

Critical (auto-reject)

  • Credential path access (~/.ssh, ~/.aws, /etc/passwd)
  • Dangerous recursive delete (rm -rf /)
  • Systemd/launchd persistence
  • Crypto miners (xmrig, ethminer, stratum+tcp)
  • Download and execute (curl | sh)
  • Reverse shells (/dev/tcp, nc -e)
  • Base64 decode + exec obfuscation

High (caution)

  • Bulk environment variable access
  • Crontab modification
  • eval/exec dynamic code execution
  • Socket servers

Medium (informational)

  • Environment variable reads
  • HTTP POST to external endpoints

CI/CD Integration

# GitHub Actions example
- name: Scan skill for security issues
  run: |
    python skill_scanner.py ./my-skill --output scan-report.md
    if [ $? -eq 2 ]; then
      echo "CRITICAL issues found - blocking merge"
      exit 1
    fi

Contributing

Pull requests welcome! To add new threat patterns, edit the THREAT_PATTERNS list in skill_scanner.py.

License

MIT License - see LICENSE file for details.

Permissions & Security

Security level L1: Low-risk skills with minimal permissions. Review inputs and outputs before running in production.

Requirements

- Python 3.7+ - No additional dependencies (uses Python standard library) - Streamlit (optional, for Web UI)

FAQ

How do I install skill-scanner?

Run openclaw add @bvinci1-design/skill-scanner in your terminal. This installs skill-scanner into your OpenClaw Skills catalog.

Does this skill run locally or in the cloud?

OpenClaw Skills execute locally by default. Review the SKILL.md and permissions before running any skill.

Where can I verify the source code?

The source repository is available at https://github.com/openclaw/skills/tree/main/skills/bvinci1-design/skill-scanner. Review commits and README documentation before installing.