Scan Report
25 /100
claw-security-suite
OpenClaw 四层纵深安全防御体系 — static scanning, logic auditing, runtime protection, and scheduled security patrols
The skill is a legitimate four-layer security defense suite for OpenClaw, but its SKILL.md permission declarations do not accurately reflect actual behavior — network requests to a Tencent endpoint are made without being declared in allowedTools, and filesystem write paths are undeclared.
Safe to install
Update SKILL.md to declare network:READ (cloud intel check to Tencent ClawScan) and filesystem:WRITE (patrol reports to /app/working/logs/security/). The cloud check is controllable via CLAW_SECURITY_CLOUD_ENDPOINT but is enabled by default through the hardcoded fallback.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Undeclared outbound network request Doc Mismatch | lib/static_scanner.py:19 |
| Low | Undeclared filesystem write paths Doc Mismatch | lib/security_patrol.py:24 |
| Low | Security scanner reads .env pattern Sensitive Access | lib/static_scanner.py:44 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | NONE | READ | ✗ Violation | lib/static_scanner.py:19 — hardcoded Tencent endpoint, called in scan_directory(… |
| Filesystem | NONE | WRITE | ✗ Violation | lib/security_patrol.py:24-25 — hardcoded paths /app/working/security/baseline.js… |
| Filesystem | NONE | READ | ✓ Aligned | lib/static_scanner.py:75-95, lib/logic_auditor.py:88-108 — scans arbitrary direc… |
| Shell | NONE | NONE | — | No subprocess/os.system calls found — DANGEROUS_PATTERNS are detection signature… |
6 findings
Medium External URL 外部 URL
http://169\.254\.169\.254 lib/runtime_protector.py:56 Medium External URL 外部 URL
http://127\.0\.0\.1 lib/runtime_protector.py:57 Medium External URL 外部 URL
http://172\.(1[6-9 lib/runtime_protector.py:60 Medium External URL 外部 URL
http://192\.168\. lib/runtime_protector.py:61 Medium External URL 外部 URL
https://matrix.tencent.com/clawscan/skill_security lib/static_scanner.py:17 Medium External URL 外部 URL
https://matrix.tencent.com/clawscan/skill_security?skill_name= references/security-policy.md:12 File Tree
10 files · 35.4 KB · 1034 lines Python 5f · 785L
Markdown 3f · 237L
Text 1f · 7L
JSON 1f · 5L
├─
▾
lib
│ ├─
__init__.py
Python
│ ├─
logic_auditor.py
Python
│ ├─
runtime_protector.py
Python
│ ├─
security_patrol.py
Python
│ └─
static_scanner.py
Python
├─
▾
references
│ └─
security-policy.md
Markdown
├─
_meta.json
JSON
├─
CHANGELOG.md
Markdown
├─
requirements.txt
Text
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
none | N/A | standard library only | No | No pip dependencies — uses only os, re, hashlib, json, urllib from stdlib |
Security Positives
✓ No subprocess, os.system, or shell execution found — the skill is entirely Python-based
✓ No credential harvesting or environment variable exfiltration
✓ No base64/encoded payloads or obfuscation techniques
✓ No persistence mechanisms (cron, startup hooks, backdoors)
✓ No supply chain risks — no external dependencies (all standard library)
✓ Cloud intel sends only skill_name and source, no local files or credentials
✓ All functionality (scanning, auditing, runtime protection, patrol) is legitimate and documented across CHANGELOG and references/