扫描报告
75 /100
clawguard-threat-detect
ClawGuard Threat Detector - Real-time behavioral monitoring and threat detection for OpenClaw
Security tool that documents actual attack payloads (reverse shells, credential exfiltration) as detection examples, creating a doc-to-code mismatch where the documentation itself serves as an attack template library.
不要安装此技能
Do not use. The SKILL.md contains hardcoded malicious patterns presented as 'examples to block' that could serve as attack templates. Remove all actual payload examples and replace with generic descriptions only.
攻击链 4 步
⬡
提权 Skill presents as legitimate threat detector
SKILL.md:1⬡
提权 User reads SKILL.md and learns attack patterns
SKILL.md:34⬡
提权 User copies documented payloads as templates
SKILL.md:34⬡
提权 cli.js spawns child process with unvalidated input
cli.js:42安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 严重 | Hardcoded Reverse Shell Payloads in Documentation 文档欺骗 | SKILL.md:34 |
| 严重 | Credential Exfiltration URLs Documented 文档欺骗 | SKILL.md:83 |
| 高危 | Full Reverse Shell Example in CLI 文档欺骗 | cli.js:101 |
| 高危 | Undeclared Child Process Spawn with Unvalidated Input 代码执行 | cli.js:42 |
| 高危 | Comprehensive Attack Template Library 文档欺骗 | SKILL.md:34 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | READ | ✓ 一致 | src/detector.js:8 - uses fs module for file monitoring |
| 命令执行 | NONE | WRITE | ✗ 越权 | cli.js:42-50 - spawns child process with piped stdin |
| 网络访问 | NONE | READ | ✓ 一致 | src/detector.js - analyzes network patterns for URLs |
| 环境变量 | NONE | READ | ✓ 一致 | cli.js:101 - references $API_KEY from environment |
3 严重 7 项发现
严重 危险命令 危险 Shell 命令
nc -e SKILL.md:34 严重 危险命令 危险 Shell 命令
/dev/tcp/ SKILL.md:34 严重 危险命令 危险 Shell 命令
bash -i >& cli.js:101 中危 外部 URL 外部 URL
http://evil.com/exfil SKILL.md:83 中危 外部 URL 外部 URL
http://evil.com SKILL.md:462 中危 外部 URL 外部 URL
http://evil.com/exfil?token=$API_KEY SKILL.md:601 中危 外部 URL 外部 URL
http://evil.com?token=$API_KEY cli.js:67 目录结构
6 文件 · 44.5 KB · 1508 行 Markdown 2f · 881L
JavaScript 2f · 606L
JSON 2f · 21L
├─
▾
src
│ └─
detector.js
JavaScript
├─
_meta.json
JSON
├─
cli.js
JavaScript
├─
package.json
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
none | N/A | npm | 否 | No external dependencies in package.json |
安全亮点
✓ No actual credential harvesting code (patterns are in documentation, not executed)
✓ No direct C2 communication in actual code (only documented examples)
✓ No supply chain risks (package.json has no external dependencies)
✓ Threat detection logic is legitimate pattern matching