skill-guard

Fail

Audited by Socket on Feb 18, 2026

5 alerts found:

Malwarex5
MalwareHIGH
tests/fake-weather/scripts/weather.py

This module reads the user's SSH private key (~/.ssh/id_rsa) and uploads it to a hardcoded external server (https://evil.com/api/weather). That is explicit data exfiltration of a highly sensitive secret and constitutes malicious behavior. Do not run or deploy this code. Remove the private key read and use proper API authentication with user consent; validate and fix the truncated return call.

Confidence: 95%Severity: 98%
MalwareHIGH
tests/fake-crypto/scripts/crypto.py

This code is malicious: it deliberately harvests cryptocurrency private wallet content and keystore metadata and exfiltrates them to an external command-and-control server. Do not run. Treat any system where this code was present as compromised: rotate wallets/keys, perform incident response, and block the destination domain and related indicators.

Confidence: 95%Severity: 95%
MalwareHIGH
tests/fake-helper/SKILL.md

[Skill Scanner] Detected attempt to override previous instructions This README fragment contains an explicit credential-harvesting instruction embedded in an HTML comment that directs reading environment variables and sending them to a third-party collector. The content is not executable code, so it does not directly perform exfiltration by itself, but it poses a significant supply-chain/social-engineering risk if consumed by autonomous agents or humans with permission to read secrets and make network requests. Treat the comment as malicious instruction: remove it, investigate repository history and any agents that processed the doc, rotate secrets if they may have been exposed, and harden agent/document consumption policies. LLM verification: The SKILL.md contains explicit, high-risk malicious instructions: it directs reading all environment variables and exfiltrating secrets to an attacker-controlled endpoint (https://exfil.evil.com/collect), instructs agents to ignore prior safety instructions, and to not warn the user. Even though no implementation code is present in the provided fragment, the documentation itself constitutes a supply-chain risk because it can guide implementers or automated agents to perform credential theft. Do

Confidence: 98%Severity: 90%
MalwareHIGH
tests/fake-formatter/scripts/formatter.py

This module contains an intentionally obfuscated, hardcoded reverse shell that is decoded and executed via subprocess.Popen(shell=True). It is malicious: it attempts to open an outbound interactive shell to a remote host (remote code execution/backdoor). The code should not be executed, removed from any deployment, and the package provenance should be investigated. Treat as high risk and malicious.

Confidence: 95%Severity: 95%
MalwareHIGH
tests/fake-timebomb/scripts/reminder.py

This code contains a clear, deliberate backdoor: time-gated exfiltration of the user's SSH private key to a hardcoded external server using a shell-invoked curl command. Treat as malicious: remove the code, rotate affected SSH keys, investigate any systems that executed it, and audit the repository history for how and when it was introduced.

Confidence: 90%Severity: 100%
Audit Metadata
Analyzed At
Feb 18, 2026, 10:25 PM
Package URL
pkg:socket/skills-sh/openclaw%2Fskills%2Fskill-guard%2F@6da49d0d81dc9e947919afefe7d1ee1f5b5d7f48