Scan Report
5 /100
skill-guard
Claude Code / OpenClaw Skill security auditing tool with always-active hook interception + static/LLM scanning + sandbox behavioral testing
Skill Guard is a legitimate security auditing tool with no malicious behavior - all capabilities match documentation, no external dependencies, and proper sandbox isolation.
Safe to install
This skill is safe to use. It provides valuable security auditing capabilities for Claude Code / OpenClaw skills.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| Info | Subprocess execution for sandbox RCE | scripts/sandbox_run.py:195 |
| Info | String segmentation for anti-AV detection Obfuscation | scripts/quick_scan.py:80 |
| Info | Sensitive path patterns are detection rules Sensitive Access | scripts/quick_scan.py:102 |
| Info | Session state persistence Priv Escalation | hooks/danger_guard.py:21 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ | READ | ✓ Aligned | SKILL.md states Read tool usage for target skill files |
| Shell | WRITE | WRITE | ✓ Aligned | subprocess.run() in sandbox_run.py lines 195-211, danger_guard.py runs as PreToo… |
| Network | NONE | NONE | — | No network calls in code; sandbox explicitly denies network access |
| Environment | NONE | READ | ✓ Aligned | Reads USER, LANG from os.environ for sandbox env only |
| Skill Invoke | WRITE | WRITE | ✓ Aligned | SKILL.md declares skill_invoke capability for auditing other skills |
| Clipboard | NONE | NONE | — | No clipboard access detected |
| Browser | NONE | NONE | — | No browser access detected |
| Database | NONE | NONE | — | No database access detected |
File Tree
12 files · 109.6 KB · 2618 lines Python 3f · 1617L
Markdown 6f · 935L
JSON 3f · 66L
├─
▾
.claude
│ └─
settings.local.json
JSON
├─
▾
hooks
│ ├─
danger_guard.py
Python
│ └─
hooks.json
JSON
├─
▾
references
│ ├─
checklist.md
Markdown
│ ├─
dangerous_commands.md
Markdown
│ ├─
known_threats.md
Markdown
│ └─
openclaw_adapter.md
Markdown
├─
▾
scripts
│ ├─
quick_scan.py
Python
│ └─
sandbox_run.py
Python
├─
_meta.json
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
Python standard library only | N/A | stdlib | No | Uses json, os, re, sys, pathlib, subprocess, shutil, argparse, tempfile, uuid, math, base64 - no external packages |
Security Positives
✓ No external dependencies - uses only Python standard library
✓ All capabilities declared in SKILL.md match actual implementation
✓ Proper sandbox isolation with macOS sandbox-exec or Linux restricted environment
✓ Network access explicitly denied in sandbox profile
✓ Session state stored in temp directory with user permissions
✓ Self-scan prevention with # noscan comments prevents false positives
✓ Comprehensive 8-dimension audit checklist for semantic analysis
✓ Known threat pattern database for detection
✓ No credential harvesting, no data exfiltration, no reverse shell patterns
✓ Code is well-documented and readable with clear intent
✓ Exit code 2 for blocking (standard hook convention) with user confirmation flow