Scan Report
50 /100
OnionClaw
Tor-based dark web OSINT tool for searching .onion sites, rotating Tor identities, and conducting multi-step threat intelligence investigations
SKILL.md describes a Tor-based dark web OSINT tool with extensive capabilities, but all referenced implementation scripts (setup.py, check_tor.py, renew.py, search.py, fetch.py, pipeline.py, etc.) are missing—only documentation exists with no verifiable code.
Use with caution
Do not use this skill. Request the full implementation code (all referenced Python scripts) before any security assessment. The documented capabilities suggest filesystem:WRITE, network:READ, shell:WRITE, and environment:READ access, but without code, hidden malicious behavior cannot be ruled out.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| High | Missing implementation code—only documentation present Doc Mismatch | SKILL.md:1 |
| Medium | Environment variable access declared without audit Sensitive Access | SKILL.md:24 |
| Medium | External code download from GitHub Supply Chain | SKILL.md:273 |
| Low | System Tor configuration modification Priv Escalation | SKILL.md:45 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | SKILL.md references --out FILE, --output-dir DIR, report writing |
| Network | READ | READ | ✓ Aligned | SKILL.md: 'routes all requests through Tor', GitHub API calls for updates |
| Shell | WRITE | WRITE | ✓ Aligned | SKILL.md: 'python3 {baseDir}/setup.py', 'python3 {baseDir}/pipeline.py' |
| Environment | READ | READ | ✓ Aligned | SKILL.md: uses 'python-dotenv' to read .env for LLM keys, torrc paths |
| Skill Invoke | NONE | NONE | — | No skill chaining declared |
| Clipboard | NONE | NONE | — | Not referenced |
| Browser | NONE | NONE | — | Not referenced |
| Database | NONE | NONE | — | Not referenced |
1 findings
Medium External URL 外部 URL
http://SOME.onion/path SKILL.md:153 File Tree
1 files · 12.1 KB · 400 lines Markdown 1f · 400L
└─
SKILL.md
Markdown
Security Positives
✓ MIT-0 license indicates open-source intent
✓ STIX/MISP output formats suggest legitimate threat intelligence use case
✓ Skill documentation is thorough and well-structured
✓ No base64-encoded payloads or obfuscation observed in documentation
✓ No direct IP addresses or C2 indicators found in documentation