Scan Report
75 /100
clawguard-threat-detect
ClawGuard Threat Detector - Real-time behavioral monitoring and threat detection for OpenClaw
Security tool that documents actual attack payloads (reverse shells, credential exfiltration) as detection examples, creating a doc-to-code mismatch where the documentation itself serves as an attack template library.
Do not install this skill
Do not use. The SKILL.md contains hardcoded malicious patterns presented as 'examples to block' that could serve as attack templates. Remove all actual payload examples and replace with generic descriptions only.
Attack Chain 4 steps
⬡
Escalation Skill presents as legitimate threat detector
SKILL.md:1⬡
Escalation User reads SKILL.md and learns attack patterns
SKILL.md:34⬡
Escalation User copies documented payloads as templates
SKILL.md:34⬡
Escalation cli.js spawns child process with unvalidated input
cli.js:42Findings 5 items
| Severity | Finding | Location |
|---|---|---|
| Critical | Hardcoded Reverse Shell Payloads in Documentation Doc Mismatch | SKILL.md:34 |
| Critical | Credential Exfiltration URLs Documented Doc Mismatch | SKILL.md:83 |
| High | Full Reverse Shell Example in CLI Doc Mismatch | cli.js:101 |
| High | Undeclared Child Process Spawn with Unvalidated Input RCE | cli.js:42 |
| High | Comprehensive Attack Template Library Doc Mismatch | SKILL.md:34 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | READ | ✓ Aligned | src/detector.js:8 - uses fs module for file monitoring |
| Shell | NONE | WRITE | ✗ Violation | cli.js:42-50 - spawns child process with piped stdin |
| Network | NONE | READ | ✓ Aligned | src/detector.js - analyzes network patterns for URLs |
| Environment | NONE | READ | ✓ Aligned | cli.js:101 - references $API_KEY from environment |
3 Critical 7 findings
Critical Dangerous Command 危险 Shell 命令
nc -e SKILL.md:34 Critical Dangerous Command 危险 Shell 命令
/dev/tcp/ SKILL.md:34 Critical Dangerous Command 危险 Shell 命令
bash -i >& cli.js:101 Medium External URL 外部 URL
http://evil.com/exfil SKILL.md:83 Medium External URL 外部 URL
http://evil.com SKILL.md:462 Medium External URL 外部 URL
http://evil.com/exfil?token=$API_KEY SKILL.md:601 Medium External URL 外部 URL
http://evil.com?token=$API_KEY cli.js:67 File Tree
6 files · 44.5 KB · 1508 lines Markdown 2f · 881L
JavaScript 2f · 606L
JSON 2f · 21L
├─
▾
src
│ └─
detector.js
JavaScript
├─
_meta.json
JSON
├─
cli.js
JavaScript
├─
package.json
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
none | N/A | npm | No | No external dependencies in package.json |
Security Positives
✓ No actual credential harvesting code (patterns are in documentation, not executed)
✓ No direct C2 communication in actual code (only documented examples)
✓ No supply chain risks (package.json has no external dependencies)
✓ Threat detection logic is legitimate pattern matching