home / skills / openclaw / skills / skill-scanner
This skill scans Clawdbot/MCP skills for malware and backdoors, delivering security reports to prevent risky installations.
npx playbooks add skill openclaw/skills --skill skill-scannerReview the files below or copy the command above to add this skill to your agents.
---
name: skill-scanner
description: Scan Clawdbot and MCP skills for malware, spyware, crypto-miners, and malicious code patterns before you install them. Security audit tool that detects data exfiltration, system modification attempts, backdoors, and obfuscation techniques.
---
# Skill Scanner
Security audit tool for Clawdbot/MCP skills - scans for malware, spyware, crypto-mining, and malicious patterns.
## Capabilities
- Scan skill folders for security threats
- Detect data exfiltration patterns
- Identify system modification attempts
- Catch crypto-mining indicators
- Flag arbitrary code execution risks
- Find backdoors and obfuscation techniques
- Output reports in Markdown or JSON format
- Provide Web UI via Streamlit
## Usage
### Command Line
```bash
python skill_scanner.py /path/to/skill-folder
```
### Within Clawdbot
```
"Scan the [skill-name] skill for security issues using skill-scanner"
"Use skill-scanner to check the youtube-watcher skill"
"Run a security audit on the remotion skill"
```
### Web UI
```bash
pip install streamlit
streamlit run streamlit_ui.py
```
## Requirements
- Python 3.7+
- No additional dependencies (uses Python standard library)
- Streamlit (optional, for Web UI)
## Entry Point
- **CLI:** `skill_scanner.py`
- **Web UI:** `streamlit_ui.py`
## Tags
#security #malware #spyware #crypto-mining #scanner #audit #code-analysis #mcp #clawdbot #agent-skills #safety #threat-detection #vulnerability
This skill scans Clawdbot and MCP skills for malware, spyware, crypto-miners, and other malicious code patterns before installation. It is a lightweight security audit tool that flags data exfiltration, system modification attempts, backdoors, and obfuscation techniques. Reports are produced in Markdown or JSON, and an optional Streamlit Web UI is available for interactive review.
The scanner inspects skill folders and static code for known malicious signatures, risky API calls, suspicious file operations, and obfuscation patterns. It looks for indicators of data exfiltration, arbitrary code execution vectors, crypto-mining routines, and hidden backdoors. The tool summarizes findings with severity levels and provides a machine-readable JSON report plus a human-friendly Markdown output. For convenience, a Streamlit front end displays results and highlights problematic files and lines.
Does the scanner run code dynamically?
No. The primary analysis is static to avoid executing untrusted code. It searches code and configuration for risky patterns and indicators.
What outputs are available?
The tool generates machine-readable JSON for automation and Markdown reports for human review. A Streamlit UI can display results interactively.