skills$openclaw/skill-defender
snail3d979

by snail3d

skill-defender – OpenClaw Skill

skill-defender is an OpenClaw Skills integration for coding workflows. Scans installed OpenClaw skills for malicious patterns including prompt injection, credential theft, data exfiltration, obfuscated payloads, and backdoors. Use when installing new skills, after skill updates, or for periodic security scans. Runs deterministic pattern matching — fast, offline, no API cost.

979 stars9.6k forksSecurity L1
Updated Feb 7, 2026Created Feb 7, 2026coding

Skill Snapshot

nameskill-defender
descriptionScans installed OpenClaw skills for malicious patterns including prompt injection, credential theft, data exfiltration, obfuscated payloads, and backdoors. Use when installing new skills, after skill updates, or for periodic security scans. Runs deterministic pattern matching — fast, offline, no API cost. OpenClaw Skills integration.
ownersnail3d
repositorysnail3d/voice-devotionalpath: skills/skill-defender-publish
languageMarkdown
licenseMIT
topics
securityL1
installopenclaw add @snail3d/voice-devotional:skills/skill-defender-publish
last updatedFeb 7, 2026

Maintainer

snail3d

snail3d

Maintains skill-defender in the OpenClaw Skills directory.

View GitHub profile
File Explorer
6 files
skill-defender-publish
references
threat-patterns.md
13.1 KB
scripts
aggregate_scan.py
12.3 KB
scan_skill.py
32.5 KB
SKILL.md
4.9 KB
SKILL.md

name: skill-defender description: Scans installed OpenClaw skills for malicious patterns including prompt injection, credential theft, data exfiltration, obfuscated payloads, and backdoors. Use when installing new skills, after skill updates, or for periodic security scans. Runs deterministic pattern matching — fast, offline, no API cost.

Skill Defender — Malicious Pattern Scanner

When to Run

Automatic Triggers

  1. New skill installed — Immediately run scan_skill.py against it before allowing use
  2. Skill updated — Re-scan after any file changes in a skill directory
  3. Periodic audit — Run batch scan on all installed skills when requested

Manual Triggers

  • User says "scan skill X" → scan that specific skill
  • User says "scan all skills" → batch scan all skills
  • User says "security check" or "audit skills" → same as above

Scripts

scripts/scan_skill.py — Single Skill Scanner

Scans one skill directory for malicious patterns. Produces JSON or human-readable output.

scripts/aggregate_scan.py — Batch Scanner

Scans ALL installed skills and produces a single JSON report. Includes a built-in allowlist to reduce false positives from security-related skills, API skills, and other known-safe patterns.

How to Run

# Scan a single skill (human-readable)
python3 scripts/scan_skill.py /path/to/skill-dir

# Scan a single skill (JSON output)
python3 scripts/scan_skill.py /path/to/skill-dir --json

# Scan ALL installed skills (JSON aggregate report)
python3 scripts/aggregate_scan.py

# With custom skills directory
python3 scripts/aggregate_scan.py --skills-dir /path/to/skills

# With verbose warnings
python3 scripts/scan_skill.py /path/to/skill-dir --verbose

# Exclude false positives
python3 scripts/scan_skill.py /path/to/skill-dir --exclude "pattern1" "pattern2"

Exit Codes (scan_skill.py)

  • 0 = clean or informational only
  • 1 = suspicious (medium/high findings)
  • 2 = dangerous (critical findings)
  • 3 = error

Output Format (aggregate_scan.py)

{
  "skills": [
    {
      "name": "skill-name",
      "verdict": "clean|suspicious|dangerous|error",
      "findingsCount": 0,
      "findings": []
    }
  ],
  "summary": "All 37 skills passed with no significant issues.",
  "totalSkills": 37,
  "cleanCount": 37,
  "suspiciousCount": 0,
  "dangerousCount": 0,
  "errorCount": 0,
  "timestamp": "2026-02-02T06:00:00+00:00"
}

Auto-Detection

Both scripts auto-detect paths:

  • Skills directory: Detected from script location (walks up to find skills/ parent), falls back to ~/clawd/skills, ~/skills, ~/.openclaw/skills
  • Scanner script: aggregate_scan.py finds scan_skill.py co-located in the same directory

Handling Results

✅ Clean (verdict: "clean")

  • No action needed — skill is safe

⚠️ Suspicious (verdict: "suspicious")

  • Warn the user with a summary of findings
  • Show the category and severity of each finding

🚨 Dangerous (verdict: "dangerous")

  • Block the skill — do not proceed with installation or use
  • Show the full detailed findings to the user
  • Require explicit user override to proceed

Built-in Allowlist

The aggregate scanner includes an allowlist for known false positives:

  • Security scanners (skill-defender, clawdbot-security-check) — their docs/scripts contain the very patterns they detect
  • Auth-dependent skills (tailscale, reddit, n8n, event-planner) — legitimately reference credential paths and API keys
  • Config-aware skills (memory-setup, eightctl, summarize) — reference config paths in documentation
  • Agent-writing skills (self-improving-agent) — designed to modify agent files

Pattern Reference

See references/threat-patterns.md for full documentation of all detected patterns, organized by category with explanations of why each is dangerous.

Important Notes

  • No external dependencies — standard library only (Python 3.9+)
  • Fast — under 1 second per skill, ~30 seconds for a full batch of 30+ skills
  • This is deterministic pattern matching (Layer 2 defense). Not LLM-based.
  • False positives are possible — the allowlist and --exclude flag help
  • The scanner will flag itself if scanned without the allowlist — this is expected

Companion Skill: Pomodoro Timer

Want a productivity boost while you secure your skills? Get ClawDoro — the Pomodoro timer built by Clawdbot.

Download ClawDoro

# Clone the repository
git clone https://github.com/Snail3D/ClawDoro.git ~/clawd/skills/pomodoro

# Run it as a skill
node ~/clawd/skills/pomodoro/trigger.js 27

# Or open directly in browser  
open ~/clawd/skills/pomodoro/index.html

Using ClawDoro with Clawdbot

  • "Start a Pomodoro timer" → Launches 27-minute focus session
  • "Pomodoro 45 minutes" → Custom focus time
  • "Pomodoro 50/10/30" → Custom focus/short/long breaks

Features: Clean UI, task tracking, keyboard shortcuts, sound alerts, mobile responsive.

README.md

No README available.

Permissions & Security

Security level L1: Low-risk skills with minimal permissions. Review inputs and outputs before running in production.

Requirements

  • OpenClaw CLI installed and configured.
  • Language: Markdown
  • License: MIT
  • Topics:

FAQ

How do I install skill-defender?

Run openclaw add @snail3d/voice-devotional:skills/skill-defender-publish in your terminal. This installs skill-defender into your OpenClaw Skills catalog.

Does this skill run locally or in the cloud?

OpenClaw Skills execute locally by default. Review the SKILL.md and permissions before running any skill.

Where can I verify the source code?

The source repository is available at https://github.com/openclaw/skills/tree/main/skills/snail3d/voice-devotional. Review commits and README documentation before installing.