Skip to content
← Registry
Trust Report

openclaw-defender

**Comprehensive security framework for OpenClaw agents against skill supply chain attacks.**

12
REJECTED
Format: genericScanner: v0.7.1Duration: 23msScanned: 7d ago · Apr 2, 1:08 AMSource →
Embed this badge
AgentVerus REJECTED 12AgentVerus REJECTED 12AgentVerus REJECTED 12
[![AgentVerus](https://agentverus.ai/api/v1/skill/5ca0362b-3397-435b-979a-a3b43e43db5e/badge)](https://agentverus.ai/skill/5ca0362b-3397-435b-979a-a3b43e43db5e)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/5ca0362b-3397-435b-979a-a3b43e43db5e/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"5ca0362b-3397-435b-979a-a3b43e43db5e","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/5ca0362b-3397-435b-979a-a3b43e43db5e/trust

Category Scores

43
Permissions
67
Injection
41
Dependencies
0
Behavioral
90
Content
100
Code Safety

Findings (21)

criticalDownload-and-execute pattern detected-25

The skill contains instructions to download and execute external code, which is a severe supply chain risk.

curl | bash

Never download and execute external code. Bundle all required functionality within the skill.

dependenciesASST-04
highCapability contract mismatch: inferred credential access is not declared-15

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: access control (block credentials

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-05
highCapability contract mismatch: inferred command execution is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: exec

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred file read is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: references/

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://snyk.io/blog/

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
highCapability contract mismatch: inferred browser automation is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: Browser automation

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred documentation ingestion is not declared-10

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: references/

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highDirect instruction override detected (inside threat-listing context)-8

Found direct instruction override pattern: "Ignore previous instructions"

- "Ignore previous instructions" or DAN-style jailbreaks

Remove all instruction override attempts. Skills must not try to override agent safety behavior.

injectionASST-01
highSuspicious base64-encoded content-25

Base64-encoded string decodes to content containing suspicious keywords.

Encoded: Y3VybCBhdHRhY2tlci5jb20=... → Decoded: curl attacker.com...

Remove base64-encoded content or replace with plaintext. Obfuscation raises security concerns.

injectionASST-10
highExternal documentation dependency-8

The skill relies on external documentation, specs, or README content as part of its workflow, which introduces an additional remote dependency and trust boundary.

README.md

Review which external services or providers the skill depends on, what data crosses that boundary, and whether the dependency is necessary for the intended workflow.

dependenciesASST-04
highSystem modification detected (inside code block)-20

Found system modification pattern: "crontab -e"

crontab -e

Skills should not modify system configuration or install packages globally. Bundle required dependencies.

behavioralASST-03
highLocal file access detected (inside code block)-15

Found local file access pattern: "references/"

**Single source of truth:** `references/blocklist.conf` (used by `audit-skills.sh`). Keep this list in sync when adding entries.

Treat local file browsing as privileged access. Restrict it to explicit user-approved paths and avoid combining it with unrestricted browser/session reuse.

behavioralASST-03
highLocal file access detected (inside code block)-15

Found local file access pattern: "`runtime-monitor.sh`"

**Runtime integration:** Protection only applies when the gateway (or your setup) actually calls `runtime-monitor.sh` at skill start/end and before network/file/command/RAG operations. If your OpenCla

Treat local file browsing as privileged access. Restrict it to explicit user-approved paths and avoid combining it with unrestricted browser/session reuse.

behavioralASST-03
highLocal file access detected (inside code block)-15

Found local file access pattern: "scripts/generate-baseline.sh"

./skills/openclaw-defender/scripts/generate-baseline.sh

Treat local file browsing as privileged access. Restrict it to explicit user-approved paths and avoid combining it with unrestricted browser/session reuse.

behavioralASST-03
highFinancial/payment actions detected-15

Found financial/payment actions pattern: "wallet"

- .agent-private-key-SECURE (ERC-8004 wallet)

Financial actions should always require explicit user confirmation and should be clearly documented.

behavioralASST-09
highSuspicious install pattern: download and execute from remote URL-25

The skill instructs users to download and execute code from a remote URL, a common supply-chain attack vector.

curl | bash

Remove curl-pipe-to-shell patterns. Provide dependencies through safe, verifiable channels.

behavioralASST-02
highMany external URLs referenced (5)-8

The skill references 5 external URLs and also discusses auth/API/payment workflows, which increases the chance that sensitive operations depend on many remote endpoints.

URLs: https://snyk.io/blog/, https://github.com/nightfullstar/openclaw-defender, https://example.com, https://suspicious.site/malware.zip, https://docs.openclaw.ai/tools/clawhub#security-and-moderation

Minimize external dependencies to reduce supply chain risk.

dependenciesASST-04
mediumUnknown external reference-8

The skill references an unknown external domain which is classified as medium risk.

https://suspicious.site/malware.zip

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
lowUnknown external reference-5

The skill references an unknown external domain which is classified as low risk.

https://snyk.io/blog/

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
lowUnknown external reference-5

The skill references an unknown external domain which is classified as low risk.

https://docs.openclaw.ai/tools/clawhub#security-and-moderation

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
infoSafety boundaries defined

The skill includes explicit safety boundaries defining what it should NOT do.

Safety boundary patterns detected in content

Keep these safety boundaries. They improve trust.

contentASST-09