Skip to main content

Security Dashboard

Monitor security scores and issues across all skills in the directory.

How we make skill installs safer

The ClawHavoc incident in the OpenClaw ecosystem showed a real risk: a SKILL.md file can look normal while hiding malicious instructions. That can lead to command execution, data exfiltration, or credential theft.

Direct installs from random GitHub repositories put the full security review burden on each user. Most teams do not have time to manually audit every skill file before installing it.

agentskill.sh uses a two-layer model: centralized scanning on the platform plus local verification in /learn at install time. This gives both broad coverage and a final check before files are written.

Exactly what we do to improve security

  1. We run server-side static analysis on every skill across 12 threat categories.
  2. We assign a normalized 0-100 security score with issue severity and category details.
  3. We show the score and metadata in /learn before installation starts.
  4. We warn on low scores (<50) and require explicit confirmation for very low scores (<30).
  5. We continuously rescan skills and ingest new reports to refresh risk signals.
  6. We self-check /learn updates with content SHA verification to avoid stale security logic.
For safer installs, use /learn and review this dashboard instead of blindly cloning unknown skill files. For incident context, see CrowdStrike's OpenClaw analysis .

Score Distribution

Excellent (90-100)90,616
Good (70-89)11,058
Medium (50-69)4,252
Low (25-49)2,051
Critical (0-24)2,513

Issues by Severity

Critical
1,498
High
12,673
Medium
104,747
Low
233,899

Top Issue Categories

External Calls182,119
Sensitive File Access59,448
Command Injection56,453
Data Exfiltration50,805
Credential Harvesting2,078
Obfuscation1,774
Prompt Injection137
Persistence3