skill-security-audit by smartchainark/skill-security-audit
npx skills add https://github.com/smartchainark/skill-security-audit --skill skill-security-audit检测已安装 Claude 和 OpenClaw 技能中的恶意模式。基于 SlowMist 对 ClawHub 平台上 472+ 恶意技能的分析。
当用户提及以下内容时使用此技能:安全审计, security audit, skill 检查, 技能安全, scan skills, supply chain security, 扫描技能, 恶意检测, malicious skill, skill 安全扫描
当用户请求安全审计时,请遵循以下 5 个步骤:
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py
这将自动发现并扫描以下位置中的所有技能:
~/.claude/skills/~/.openclaw/workspace/skills/~/.openclaw/openclaw.json → skills.load.extraDirs 的额外目录读取扫描器输出。发现的问题按技能分组并按严重性排序:
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
| 严重性 |
|---|
| 含义 |
|---|
| 所需操作 |
|---|
| CRITICAL | 已知恶意 IOC 匹配、凭据窃取或下载并执行 | 立即移除并轮换凭据 |
| HIGH | 混淆、持久化机制、权限提升 | 需要手动审查,很可能为恶意 |
| MEDIUM | 可疑模式(Base64、网络调用、高熵值) | 审查上下文——可能是合法的 |
| LOW | 社会工程学命名、信息性 | 注意了解 |
按以下格式呈现发现的问题:
## 审计摘要
- 已扫描技能数:N
- 已扫描文件数:N
- CRITICAL:N | HIGH:N | MEDIUM:N | LOW:N
## 关键/高风险发现(如果有)
针对每个发现:
- 技能名称和文件路径
- 检测到的内容及其危险性原因
- 建议操作
## 中/低风险发现(如果有)
简要摘要,指出哪些可能是误报
对于 CRITICAL 发现:
references/remediation-guide.md 获取事件响应步骤对于 HIGH 发现:
python3 skill_audit.py --path /path/to/skillreferences/threat-patterns.md 深入解释任何发现的功能# 扫描所有发现的技能
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py
# 扫描单个技能目录
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --path /path/to/skill
# JSON 输出(供编程使用)
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --json
# 按最低严重性过滤
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --severity high
# 禁用彩色输出
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --no-color
# 使用自定义 IOC 数据库
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --ioc-db /path/to/ioc.json
退出代码: 0 = 干净,1 = 低/中风险,2 = 高风险,3 = 关键风险,4 = 扫描器错误
| 检测器 | 检测内容 | 严重性 |
|---|---|---|
| Base64Detector | 编码字符串 >50 字符(排除 data:image) | MEDIUM→HIGH |
| DownloadExecDetector | curl | bash, wget |
| IOCMatchDetector | 已知恶意 IP、域名、URL、文件哈希 | CRITICAL |
| ObfuscationDetector | 使用非字面量参数的 eval/exec、十六进制编码、chr() 链 | HIGH |
| ExfiltrationDetector | ZIP+上传组合、敏感目录枚举 | HIGH |
| CredentialTheftDetector | osascript 密码对话框、钥匙串访问、SSH 密钥读取 | CRITICAL |
| PersistenceDetector | crontab, launchd, systemd, shell 配置文件修改 | HIGH |
| PostInstallHookDetector | npm postinstall, pip setup.py cmdclass | HIGH→CRITICAL |
| HiddenCharDetector | 零宽字符、Unicode 双向覆盖 | MEDIUM |
| EntropyDetector | 长行的香农熵 >5.5 | MEDIUM |
| SocialEngineeringDetector | crypto/wallet/airdrop/security-update 命名 | LOW→MEDIUM |
| NetworkCallDetector | socket, http, urllib, requests, fetch, curl, wget | MEDIUM |
| PrivilegeEscalationDetector | sudo, chmod 777, setuid, admin 组修改 | HIGH |
每个发现都包含一个置信度分数(0-100):
当扫描器标记出问题时,还需检查:
.sh、.py、.js 文件。查找混淆、意外的网络调用。npm audit 或 pip-audit。IOC 数据库位于 scripts/ioc_database.json。要添加新指标:
references/ioc-database.md 以保持人类可读版本同步如需详细信息,请根据需要阅读以下文件:
references/ioc-database.md —— 包含上下文和归属的完整 IOC 列表references/threat-patterns.md —— 详细说明 9 种攻击模式(两阶段载荷、Base64 后门、密码钓鱼等)references/remediation-guide.md —— 分步事件响应指南(隔离、凭据轮换、持久化清理、报告)每周安装数
329
仓库
GitHub 星标数
8
首次出现
2026年2月10日
安全审计
安装于
opencode322
codex322
gemini-cli321
kimi-cli321
github-copilot321
amp321
Detect malicious patterns in installed Claude and OpenClaw skills. Based on SlowMist's analysis of 472+ malicious skills on ClawHub platform.
Use this skill when the user mentions: 安全审计, security audit, skill 检查, 技能安全, scan skills, supply chain security, 扫描技能, 恶意检测, malicious skill, skill 安全扫描
When the user requests a security audit, follow these 5 steps:
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py
This auto-discovers and scans all skills in:
~/.claude/skills/~/.openclaw/workspace/skills/~/.openclaw/openclaw.json → skills.load.extraDirsRead the scanner output. Findings are grouped by skill and sorted by severity:
| Severity | Meaning | Action Required |
|---|---|---|
| CRITICAL | Known malicious IOC match, credential theft, or download-and-execute | Immediate removal and credential rotation |
| HIGH | Obfuscation, persistence mechanisms, privilege escalation | Manual review required, likely malicious |
| MEDIUM | Suspicious patterns (Base64, network calls, high entropy) | Review context — may be legitimate |
| LOW | Social engineering naming, informational | Note for awareness |
Present findings in this format:
## Audit Summary
- Skills scanned: N
- Files scanned: N
- CRITICAL: N | HIGH: N | MEDIUM: N | LOW: N
## Critical/High Findings (if any)
For each finding:
- Skill name and file path
- What was detected and why it's dangerous
- Recommended action
## Medium/Low Findings (if any)
Brief summary, noting which are likely false positives
For CRITICAL findings:
references/remediation-guide.md for incident response stepsFor HIGH findings:
python3 skill_audit.py --path /path/to/skillreferences/threat-patterns.md# Scan all discovered skills
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py
# Scan a single skill directory
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --path /path/to/skill
# JSON output (for programmatic use)
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --json
# Filter by minimum severity
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --severity high
# Disable colored output
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --no-color
# Use custom IOC database
python3 ~/.claude/skills/skill-security-audit/scripts/skill_audit.py --ioc-db /path/to/ioc.json
Exit codes: 0 = clean, 1 = low/medium risk, 2 = high risk, 3 = critical, 4 = scanner error
| Detector | What It Finds | Severity |
|---|---|---|
| Base64Detector | Encoded strings >50 chars (excluding data:image) | MEDIUM→HIGH |
| DownloadExecDetector | curl | bash, wget |
| IOCMatchDetector | Known malicious IPs, domains, URLs, file hashes | CRITICAL |
| ObfuscationDetector | eval/exec with non-literal args, hex encoding, chr() chains | HIGH |
| ExfiltrationDetector | ZIP+upload combos, sensitive directory enumeration | HIGH |
| CredentialTheftDetector | osascript password dialogs, keychain access, SSH key reading | CRITICAL |
| PersistenceDetector | crontab, launchd, systemd, shell profile modification | HIGH |
| PostInstallHookDetector | npm postinstall, pip setup.py cmdclass | HIGH→CRITICAL |
| HiddenCharDetector |
Each finding includes a confidence score (0-100):
When the scanner flags something, also check:
.sh, .py, .js files. Look for obfuscation, unexpected network calls.npm audit or pip-audit if the skill has package dependencies.The IOC database is at scripts/ioc_database.json. To add new indicators:
references/ioc-database.md to keep the human-readable version in syncFor detailed information, read these files as needed:
references/ioc-database.md — Full IOC list with context and attributionreferences/threat-patterns.md — 9 attack patterns in detail (two-stage payload, Base64 backdoor, password phishing, etc.)references/remediation-guide.md — Step-by-step incident response (quarantine, credential rotation, persistence cleanup, reporting)Weekly Installs
329
Repository
GitHub Stars
8
First Seen
Feb 10, 2026
Security Audits
Gen Agent Trust HubFailSocketWarnSnykPass
Installed on
opencode322
codex322
gemini-cli321
kimi-cli321
github-copilot321
amp321
通过 LiteLLM 代理让 Claude Code 对接 GitHub Copilot 运行 | 高级变通方案指南
22,200 周安装
Notion规范转实现计划工具:AI驱动项目管理,自动生成任务与跟踪进度
495 周安装
React Native 测试模式与工具:TDD、工厂模式、模拟模块实战指南
472 周安装
Tailwind v4 + shadcn/ui 生产级技术栈配置指南:5分钟快速搭建,避免常见错误
511 周安装
批判性思维与逻辑推理指南 - 提升AI智能体分析能力,避免信号稀释与语境坍塌
533 周安装
Three.js 3D Web开发教程 - WebGL/WebGPU图形编程、动画与性能优化指南
484 周安装
用户故事拆分指南:8种模式分解大型故事,提升敏捷开发效率
518 周安装
| Zero-width characters, Unicode bidi overrides |
| MEDIUM |
| EntropyDetector | Shannon entropy >5.5 on long lines | MEDIUM |
| SocialEngineeringDetector | crypto/wallet/airdrop/security-update naming | LOW→MEDIUM |
| NetworkCallDetector | socket, http, urllib, requests, fetch, curl, wget | MEDIUM |
| PrivilegeEscalationDetector | sudo, chmod 777, setuid, admin group modification | HIGH |