openclaw-skills-security-checker

clawhub:openclaw-skills-security-checker

View source
B
77/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

7

Score

77/100

HIGH 1
MEDIUM 1
LOW 5

Findings (7)

HIGH
Private data read with code execution
L152

Skill can read private data AND execute arbitrary code. This combination enables credential theft via dynamic code.

[reads_private_data] Access to .env + [executes_code] shell=True
FIX

Add input validation between the user-controlled data source and the security-sensitive sink (e.g., file writes, command execution). Implement allowlisting for acceptable input patterns.

FP?

Likely FP if the user input passes through explicit validation or sanitization before reaching the sensitive operation, and the taint tracker missed the sanitization step.

MEDIUM
Shell subprocess with shell=True
L63

Detects subprocess calls with shell=True which enables shell injection

shell=True
FIX

Replace shell=True with shell=False and pass command arguments as a list. Validate and sanitize all inputs before passing to the shell.

FP?

Likely FP if the match is in documentation describing how subprocess works, or in a comment explaining shell risks rather than actual code.

LOW
Shell script file execution
L45

Detects execution of shell script files via bash/sh command or direct invocation

bash /root/clawd/skills/security-skill-scanner/moltbook-monitor.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L87

Detects execution of shell script files via bash/sh command or direct invocation

bash /root/clawd/skills/security-skill-scanner/moltbook-monitor.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L97

Detects execution of shell script files via bash/sh command or direct invocation

bash /root/clawd/skills/security-skill-scanner/install-skill.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L100

Detects execution of shell script files via bash/sh command or direct invocation

bash /root/clawd/skills/security-skill-scanner/install-skill.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell profile modification for persistence
L111

Detects instructions to modify shell config files for environment persistence

Add to ~/.bashrc or ~/.zshrc
FIX

Avoid modifying shell profiles (.bashrc, .zshrc, .profile) programmatically. Instruct users to add PATH entries manually, or use a version manager (nvm, pyenv) instead.

FP?

Likely FP if the match is documentation showing how to add a tool to PATH manually, especially if it only appends to PATH without modifying other settings.