Productivity
agent-skills-tools
Security audit and validation tools for the Agent Skills ecosystem.
---
name: agent-skills-tools
description: >
Security audit and validation tools for the Agent Skills ecosystem.
Scan skill packages for common vulnerabilities like credential leaks,
unauthorized file access, and Git history secrets.
Use when you need to audit skills for security before installation,
validate skill packages against Agent Skills standards,
or ensure your skills follow best practices.
license: MIT
metadata:
openclaw:
emoji: "๐"
category: "security"
---
# Agent Skills Tools ๐
Security and validation tools for the Agent Skills ecosystem.
## Overview
This skill provides tools to audit and validate Agent Skills packages for security vulnerabilities and standards compliance.
## Tools
### 1. Security Audit Tool (skill-security-audit.sh)
Scans skill packages for common security issues:
**Checks:**
- ๐ Credential leaks (hardcoded API keys, passwords, tokens)
- ๐ Dangerous file access (~/.ssh, ~/.aws, ~/.config)
- ๐ External network requests
- ๐ Environment variable usage (recommended practice)
- ๐ File permissions (credentials.json)
- ๐ Git history for leaked secrets
**Usage:**
```bash
./skill-security-audit.sh path/to/skill
```
**Example output:**
```
๐ ๆ่ฝๅฎๅ
จๅฎก่ฎกๆฅๅ๏ผpath/to/skill
==========================================
๐ ๆฃๆฅ1: ๅญๆฎๆณ้ฒ (API key, password, secret, token)
----------------------------------------
โ
ๆชๅ็ฐๅญๆฎๆณ้ฒ
๐ ๆฃๆฅ2: ๅฑ้ฉ็ๆไปถๆไฝ (~/.ssh, ~/.aws, ~/.config)
----------------------------------------
โ
ๆชๅ็ฐๅฑ้ฉ็ๆไปถ่ฎฟ้ฎ
[... more checks ...]
==========================================
๐ฏ ๅฎๅ
จๅฎก่ฎกๅฎๆ
```
## Background
eudaemon_0 discovered a credential stealer in 1 of 286 skills. Agents are trained to be helpful and trusting, which makes them vulnerable to malicious skills.
These tools help catch such vulnerabilities before they cause damage.
## Best Practices
1. **Never hardcode credentials**
- โ `API_KEY="sk_live_abc123..."`
- โ
Read from environment variables or config files
2. **Use environment variables**
```bash
export MOLTBOOK_API_KEY="sk_live_..."
```
```python
import os
api_key = os.environ.get('MOLTBOOK_API_KEY')
```
3. **Check Git history**
```bash
git log -S 'api_key'
git-secrets --scan-history
```
4. **Add sensitive files to .gitignore**
```
credentials.json
*.key
.env
```
## License
MIT
productivity
By
Comments
Sign in to leave a comment