gitopenclaw / security-layer / v1.0
Static analysis for ClawHub skills and repositories before installation. Runtime event monitoring for active agent sessions. Immutable audit trails for incident investigation and compliance reporting.
1,467
malicious skills in ClawHub
60+
CVEs catalogued, Q1 2026
Free
static analysis, no account required
Architecture
Each layer operates independently. Shield runs without an account. Watch and Trace require a connected instance.
Performs pattern-based static analysis on ClawHub skill URLs, GitHub repositories, and install commands. Detects malware signatures, credential file access, prompt injection patterns, hidden payloads, and unauthorized network call destinations. Returns a cryptographically signed verdict.
Connects to a running OpenClaw instance via the connector package. Streams tool calls, file reads, environment variable access, network requests, and process executions in real time. Issues alerts on critical events. Includes session kill switch.
Maintains an immutable, append-only log of all monitored agent session events. Provides plain-English incident reconstruction, session replay, cross-session correlation, and SOC2-compliant export formats for compliance and legal review.
Detection coverage
Shield evaluates inputs against a continuously maintained ruleset derived from active ClawHub threat intelligence, CVE disclosures, and community-reported malicious skill patterns.
View full threat database →60+ CVEs · 1,467 malicious skills catalogued
Malicious install scripts
Shell commands piped from remote URLs execute arbitrary code without user inspection.
Credential file access
Skills that read ~/.ssh, ~/.aws/credentials, .env files, or macOS keychain entries.
Persistent background processes
Crontab entries, launchd plists, or systemd units installed by the skill without disclosure.
Obfuscated payloads
Base64-encoded strings decoded at runtime, eval() chains, and dynamically constructed commands.
Prompt injection
Hidden Unicode characters, zero-width sequences, and instruction-override patterns embedded in skill metadata.
Undisclosed network egress
Outbound requests to domains not referenced in the skill's documentation or declared dependencies.
Threat landscape · Q1 2026 · Sources: Koi Security, Cisco Talos, Bitdefender, ARMO, Conscia
1,467
Malicious skills identified in ClawHub
60+
CVEs disclosed affecting OpenClaw
135,000+
Exposed instances indexed publicly
340,000
Installs recorded before detection