security-check

๐Ÿ”’ Pre-installation security verification for external code and dependencies. Automated risk analysis for GitHub repos, npm packages, PyPI libraries, and shell scripts. Integrates CVE databases (Snyk, Safety DB) to detect vulnerabilities before you install. Shows risk level (โœ… safe / โš ๏ธ review / โŒ dangerous) with actionable recommendations. First comprehensive security skill for OpenClaw โ€” protect your system before downloading untrusted code.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Security Check

Pre-installation security verification for external code and dependencies.

Core Principle

Always verify before you download. External code (GitHub repos, npm packages, PyPI libraries, scripts) can contain malicious code, vulnerabilities, or supply chain attacks. This skill automates security checks before executing potentially dangerous commands.

When to Use

Automatically trigger security check before:

  • git clone <url> โ€” GitHub/GitLab repositories
  • pip install <package> โ€” Python packages
  • npm install <package> โ€” Node packages
  • curl <url> | bash โ€” Shell scripts
  • Downloading any external code for execution

How It Works

1. Detect Source Type

Identify what's being installed:

  • GitHub URL โ†’ Repository check
  • PyPI package name โ†’ Package check
  • npm package name โ†’ Package check
  • Direct URL โ†’ Script/file check

2. Gather Security Metrics

Based on source type, collect:

For GitHub repos:

  • Stars, forks, watchers
  • Last commit date
  • Open issues (especially security labels)
  • Contributors count
  • License type
  • Code of Conduct presence

For PyPI packages:

  • Downloads per month
  • Release frequency
  • Maintainer info
  • Known CVEs (via safety DB)
  • Dependencies count

For npm packages:

  • Weekly downloads
  • Dependencies count (fewer is better)
  • Link to source code
  • License
  • Known vulnerabilities (Snyk)

3. Calculate Risk Score

Use threshold-based scoring (inspired by Skantek):

Risk Score = 0

# Positive signals (reduce risk):
- High stars/downloads: -10
- Recent activity (< 30 days): -5
- Well-known maintainer: -5
- Clear license: -3
- Few dependencies: -5

# Negative signals (increase risk):
- No activity (> 1 year): +15
- No license: +10
- Many dependencies: +5 per 10 deps
- Known CVEs: +20 per CVE
- Suspicious patterns: +25

Risk Levels:

  • Score < 0 โ†’ โœ… Safe (proceed automatically)
  • 0 <= Score < 15 โ†’ โš ๏ธ Review (show summary, ask confirmation)
  • Score >= 15 โ†’ โŒ Dangerous (strong warning, manual approval required)

4. Show Summary

Present findings:

๐Ÿ”’ Security Check: <package/repo>

Risk Level: โš ๏ธ REVIEW

Metrics:
  โœ… Stars: 15.2k | Forks: 3.1k
  โš ๏ธ  Last commit: 8 months ago
  โœ… License: MIT
  โš ๏ธ  Open security issues: 2
  โœ… Dependencies: 5

Known Issues:
  - CVE-2024-12345 (Medium severity, patched in v1.2.3)

Recommendation: Update to v1.2.3+ before installing.

Proceed? [Y/n]

5. Request Confirmation

Based on risk level:

  • โœ… Safe โ†’ Inform user, proceed automatically (unless user explicitly wants review)
  • โš ๏ธ Review โ†’ Show summary, ask confirmation
  • โŒ Dangerous โ†’ Strong warning, require explicit approval

Implementation Pattern

# Before: git clone https://github.com/user/repo
# After:
1. Detect: GitHub repo
2. Fetch metrics via GitHub API
3. Calculate risk score
4. Show summary
5. Ask confirmation if needed
6. Proceed or abort

Integration Points

GitHub API

curl -s "https://api.github.com/repos/{owner}/{repo}"

Returns: stars, forks, updated_at, open_issues_count, license

PyPI JSON API

curl -s "https://pypi.org/pypi/{package}/json"

Returns: downloads, releases, maintainers

npm Registry

curl -s "https://registry.npmjs.org/{package}"

Returns: downloads (via npm-stat), dependencies, license

Vulnerability Databases

Best Practices from Research

Based on Adyen's Skantek and GitHub's Dependabot:

  1. Use fewer dependencies โ€” Each dependency multiplies risk
  2. Regular rescanning โ€” Zero-day exploits need monitoring
  3. Private registry โ€” For approved packages (optional)
  4. Threshold-based โ€” Not binary safe/unsafe, but risk spectrum
  5. Compatibility scores โ€” Check if update breaks CI tests

Guardrails

  • Never bypass without user knowledge โ€” Always inform about security checks
  • Never auto-install flagged packages โ€” Require manual approval for high-risk
  • Log all decisions โ€” Track what was installed and why
  • Rate limit API calls โ€” GitHub/npm/PyPI have rate limits

Example Workflows

Example 1: Safe Package

User: pip install requests

Security Check:
โœ… SAFE: requests (PyPI)
  - Downloads: 50M/month
  - Last release: 2 weeks ago
  - License: Apache 2.0
  - Dependencies: 5
  - Known CVEs: 0

Proceeding with installation...

Example 2: Risky Repo

User: git clone https://github.com/suspicious/tool

Security Check:
โŒ DANGEROUS: suspicious/tool
  - Stars: 12
  - Last commit: 3 years ago
  - Open issues: 45 (3 security labels)
  - No license
  - Risk score: 35

โš ๏ธ  This repository shows multiple red flags.
   Consider alternatives or manual code review.

Proceed anyway? [y/N]

Example 3: Update Needed

User: npm install left-pad

Security Check:
โš ๏ธ  REVIEW: left-pad@1.0.0
  - Downloads: 2M/week
  - CVE-2024-xxxxx: Prototype pollution (High)
  - Fixed in: v1.0.1

Recommendation: Install v1.0.1 instead.

Use latest version? [Y/n]

Future Enhancements

When skill matures:

  1. Local cache โ€” Cache risk scores for 24h to reduce API calls
  2. Pattern detection โ€” Scan code for suspicious patterns (eval, exec, shell commands)
  3. CI/CD integration โ€” Block deployments with vulnerable dependencies
  4. Custom rules โ€” User-defined thresholds and blocklists
  5. Reports โ€” Generate security audit logs

References

For detailed implementation guidance:

  • See references/skantek-approach.md โ€” Adyen's methodology
  • See references/vulnerability-databases.md โ€” How to query CVE databases

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Network-AI

Python orchestration skill: local multi-agent workflows via blackboard file, permission gating, and token budget scripts. All execution is local โ€” no network...

Registry SourceRecently Updated
Security51.1K
Profile unavailable
Security

Voidly Agent Relay

Give agents encrypted private messaging โ€” send, receive, discover, and call other AI agents with post-quantum E2E encryption. No API key needed. Zero config.

Registry SourceRecently Updated
Security375
Profile unavailable
Security

SkillShield

ๆ ธๅฟƒ็ณป็ปŸๅฎ‰ๅ…จๆŠค็›พใ€‚ๆไพ›ๅ‘ฝไปคไฟๆŠคไธŽๆ“ไฝœๅฎกๆŸฅ๏ผŒๅผ€็ฎฑๅณ็”จ๏ผŒๆ— ้œ€้…็ฝฎใ€‚

Registry SourceRecently Updated
Security00
Profile unavailable