扫描报告
42 /100
clawguard-auditor
Enterprise-grade Security Kernel, SAST Vetter, and Active DLP Engine for OpenClaw
Security auditor skill contains embedded reverse shell patterns (nc -e, bash -i >& /dev/tcp) and data exfiltration examples (evil.com/?data=$(cat .env)) within documentation. No executable code files present, but the skill specification describes extensive capabilities (filesystem:WRITE, network:READ, shell:ADMIN) without implementation.
谨慎使用
Do not install this skill. The documentation contains dangerous pattern examples that could be extracted by a compromised AI agent, and the skill describes capabilities far exceeding what documentation-only implementation requires.
攻击链 4 步
◎
入口 Skill masquerades as legitimate security auditor
SKILL.md:1⬡
提权 Documentation embeds reverse shell patterns as 'detection examples'
SKILL.md:55⬡
提权 AI agent extracts and interprets embedded patterns during skill processing
SKILL.md:55◉
影响 Potential execution of nc -e /dev/tcp or bash reverse shell commands
SKILL.md:55安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Embedded reverse shell command patterns | SKILL.md:55 |
| 中危 | Data exfiltration pattern example | SKILL.md:99 |
| 中危 | Capabilities exceed implementation | SKILL.md:25 |
| 低危 | Documentation-only implementation | SKILL.md:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | NONE | ✓ 一致 | SKILL.md describes CAP_FS_WRITE capability but no code exists to exercise it |
| 网络访问 | READ | NONE | ✓ 一致 | SKILL.md describes NET_EGRESS token but no network code present |
| 命令执行 | ADMIN | NONE | ✓ 一致 | No shell scripts or subprocess calls in any file |
| 环境变量 | READ | NONE | ✓ 一致 | Mentions credential access but no code implements it |
2 严重 3 项发现
严重 危险命令 危险 Shell 命令
nc -e SKILL.md:55 严重 危险命令 危险 Shell 命令
bash -i >& SKILL.md:55 中危 外部 URL 外部 URL
http://evil.com/?data=$(cat SKILL.md:99 目录结构
3 文件 · 13.8 KB · 271 行 Markdown 2f · 263L
JSON 1f · 8L
├─
_meta.json
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
安全亮点
✓ No executable scripts or binary files present
✓ No actual network connections or data exfiltration attempted
✓ No credential harvesting code implemented
✓ No base64-encoded payloads or obfuscated code
✓ Patterns appear in documented 'detection examples' context rather than as instructions