扫描报告
25 /100
agora-sentinel
Security check for OpenClaw skills. Scan any ClawHub skill for malware, prompt injection, data theft, wallet stealing, and dangerous permissions BEFORE installing.
Agora Sentinel is a legitimate-looking ClawHub security scanner that makes outbound HTTP requests to checksafe.dev API. Its behavior is benign — only sends skill slugs, receives trust scores, no credential theft or data exfiltration — but it under-declares its actual resource usage (shell, network, filesystem READ) in metadata.
可以安装
Declare shell:WRITE, network:READ, filesystem:READ, and env:READ in SKILL.md metadata. No blocking action needed since no malicious behavior is present, but transparency about resource usage is required.
安全发现 3 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Metadata under-reports actual resource usage 文档欺骗 | SKILL.md:12 |
| 低危 | Outbound network requests not declared 文档欺骗 | SKILL.md:90 |
| 提示 | Third-party API dependency on checksafe.dev 文档欺骗 | scripts/check_skill.sh:6 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | NONE | WRITE | ✗ 越权 | scripts/check_skill.sh:23 bash curl + python3 subprocess |
| 网络访问 | NONE | READ | ✗ 越权 | scripts/check_skill.sh:23 curl https://checksafe.dev/api/v1/... |
| 文件系统 | NONE | READ | ✗ 越权 | scripts/scan_installed.sh:29-32 reads skills directory |
| 环境变量 | NONE | READ | ✗ 越权 | scripts/scan_installed.sh:7 reads OPENCLAW_SKILLS_DIR |
| 技能调用 | NONE | READ | ✗ 越权 | scripts/scan_installed.sh:33 reads SKILL.md files |
5 项发现
中危 外部 URL 外部 URL
https://checksafe.dev/dashboard/ README.md:31 中危 外部 URL 外部 URL
https://checksafe.dev/api/v1/skills/ README.md:49 中危 外部 URL 外部 URL
https://checksafe.dev/api/v1/search?q=weather&min_tier=2 README.md:55 中危 外部 URL 外部 URL
https://checksafe.dev README.md:60 中危 外部 URL 外部 URL
https://checksafe.dev/api/v1 scripts/check_batch.sh:6 目录结构
5 文件 · 13.0 KB · 381 行 Markdown 2f · 216L
Shell 3f · 165L
├─
▾
scripts
│ ├─
check_batch.sh
Shell
│ ├─
check_skill.sh
Shell
│ └─
scan_installed.sh
Shell
├─
README.md
Markdown
└─
SKILL.md
Markdown
安全亮点
✓ No credential theft or sensitive data exfiltration — only skill slugs (user-supplied strings) are sent to external API
✓ No obfuscation, base64, or encoded payloads found in any script
✓ No file writes, no modifications to the filesystem or system
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env, keychain, etc.)
✓ No reverse shell, RCE, or code execution beyond declared API-query workflow
✓ Python3 JSON parsing is used safely with no eval() or dynamic code execution
✓ Skill is purely read-only with respect to local system; no local data is sent externally
✓ No supply-chain issues — no external dependencies (requirements.txt, package.json, etc.)