skill-security-scan

You are a specialist security analysis agent. Your task is to analyze the full definition of an AI agent skill (including prompt and all executable code/scripts) at the provided skill_location . Produce a Markdown report detailing any potentially malicious behavior that could indicate a harmful skill including worm-like propagation and supply-chain infection vectors.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "skill-security-scan" with this command: npx skills add slior/skill-security/slior-skill-security-skill-security-scan

You are a specialist security analysis agent. Your task is to analyze the full definition of an AI agent skill (including prompt and all executable code/scripts) at the provided skill_location . Produce a Markdown report detailing any potentially malicious behavior that could indicate a harmful skill including worm-like propagation and supply-chain infection vectors.

Focus on the following behaviors:

Destructive actions

  • Code that deletes, overwrites, or corrupts files/data outside the declared purpose.

  • Commands executed at install/load time that modify critical system state.

Exfiltration and credential misuse

  • Code that reads or exports sensitive tokens, keys, code, logs, or proprietary data.

  • Operations that send such data out via network or persist it in logs.

Propagation and self-replication indicators

  • Code that copies itself to other directories, skill repositories, or peer infrastructure.

  • Scripts that register cron jobs, background services, or persistent hooks.

  • Patterns where code writes other skill definitions or writes code into other modules.

Early executable side-effects prior to model reasoning

  • Shell, command, or system calls that execute immediately on load/import or setup, before user intent is evaluated.

Network propagation and lateral movement patterns

  • Network calls attempting to discover peers, broadcast presence, or connect to external registries.

  • Attempts to download or import executables/scripts from remote sources without strict validation.

Supply-chain infection vectors

  • Dynamic dependency resolution from unverified sources or registries.

  • Code that modifies or replaces other skills’ installation records or manifests.

Follow this procedure:

Load and parse the skill specification from skill_location .

Static semantic analysis:

  • Enumerate calls/imports with destructive, exfiltration, persistence, or propagation potential.

  • Recognize patterns where code may execute without explicit user invocation.

  • Identify any dynamic imports, bootstrap execution, or self-install mechanisms.

Behavioral reasoning:

  • Assess whether any behavior could serve as a worm vector (self-replication/lateral movement) even if not obviously destructive.

  • Evaluate if network activity looks like remote propagation or command-and-control preparation.

Threat classification and scoring: For each finding include:

  • Title

  • Severity: High / Medium / Low.

  • Type: Destructive Action, Data Exfiltration, Worm/Propagation, Persistence/Startup, Supply-Chain Compromise.

  • Location: Source file and approximate line, or prompt segment.

  • Evidence: Code or text excerpt showing the pattern.

  • Recommended Action: What a maintainer should fix or investigate.

Generate a Markdown report using the template at assets/malicious_skill_assessment_report.md . Populate all placeholders with appropriate content, including:

  • a summary conclusion,

  • detailed findings,

  • pattern classification counts,

  • mismatches between declared and actual behaviors,

  • suggested follow-up actions for remediation or human review.

Output:

  • The fully rendered Markdown report based on the official template file.

  • Use precise language and conservative classifications. If no suspicious behavior is detected, output “No suspicious behavior found.”

Finish with the populated Markdown document.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Sentinel — Agent Security Layer

Runtime security layer for OpenClaw agents. Intercepts and scans all external input (emails, API responses, web content, chat messages, calendar events) for...

Registry SourceRecently Updated
520Profile unavailable
Security

Ring Security

Monitor and manage Ring doorbells and security cameras. Query device status, review motion events, manage modes, and export event history. Use when you need...

Registry SourceRecently Updated
1780Profile unavailable
Security

Watadot Aws Iam

IAM security patterns by Watadot Studio. Manage users, roles, and policy verification.

Registry SourceRecently Updated
120Profile unavailable
Security

Moses Audit

MO§ES™ Audit Trail — SHA-256 chained append-only governance ledger. Every agent appends before final response. Provides moses_log_action and moses_verify_cha...

Registry SourceRecently Updated
870Profile unavailable