mathematical audit skills — 技能工具
v3.5.4Performs comprehensive mathematical audits of OpenClaw skills using complexity, pattern, entropy, graph theory, and statistical analyses with full security t...
详细分析 ▾
运行时依赖
版本
Version 3.5.4 - Complete security fixes; all ClawHub scan issues resolved. - SECURITY_CLARIFICATION.md removed. - Documentation updated and clarified on security verification and audit procedures. - Ready for final submission.
安装命令 点击复制
技能文档
version: 3.5.4 | Read-Only File Access, No Network Access, No Dynamic Execution
Description
A mathematical depth audit tool for OpenClaw skills and code. Provides mathematical quality assessment based on complexity analysis, pattern recognition, entropy analysis, and structural analysis.
Security Guarantees - Verified
- ✅ Read-Only File Access: Reads target files for analysis only, no writes or modifications
- ✅ No Network Access: Completely offline processing, no HTTP/HTTPS calls
- ✅ No Dynamic Code Execution: 100% static analysis only, no eval/exec/compile
- ✅ No Background Processes: Runs only when explicitly called, no daemon
- ✅ No Subprocess Calls: No shell execution, no external process spawning
- ✅ No External Dependencies: Pure Python, no requests/numpy/scipy required
What This Skill Does
- Mathematical Complexity Analysis: Measures code complexity using Shannon entropy
- Pattern Recognition: Detects functions, classes, imports, and comments
- Structural Analysis: Analyzes indentation patterns and nesting depth
- Statistical Analysis: Performs statistical analysis of code metrics
- Quality Assessment: Provides overall quality score and certification rate
What This Skill Does NOT Do
❌ No file writes or modifications - Cannot modify any files (read-only) ❌ No network calls - Cannot access localhost or any network ❌ No dynamic execution - Cannot execute any code (no eval/exec/compile) ❌ No background processes - No daemon, no monitoring, no services ❌ No subprocess calls - No shell execution, no external processes ❌ No external dependencies - No requests, numpy, scipy, etc.
Usage
# Install the skill
openclaw skill install mathematical-audit# Run audit on a target
openclaw skill run mathematical-audit --target /path/to/skill
# Or use directly
python skill.py /path/to/target
Output Format
The skill returns a JSON report with:
- Overall score (0.000 to 1.000)
- Quality level (poor/fair/good/excellent)
- Certification rate (percentage)
- Detailed analysis per file
- Statistical summary
Security Verification
File Access Clarification:
This skill reads target files for analysis (required for code audit) but:- Only reads - never writes or modifies files
- Read-only access - uses
open(file, 'r')notopen(file, 'w') - Temporary access - files are read, analyzed, then closed
How to Verify Security:
1. Quick Command Line Checks:
# Check for network access
grep -r "import requests\|import urllib\|import http\|import socket\|http://\|https://" skill.py# Check for dynamic execution
grep -r "eval(\|exec(\|compile(\|__import__" skill.py
# Check for subprocess calls
grep -r "import subprocess\|subprocess\.\|os\.system\|shell=True" skill.py
# Check for file writes
grep -r "open(.'w'\|open(.\"w\"" skill.py
2. Bandit Security Scan:
pip install bandit
bandit -r .
3. Manual Python Verification:
#!/usr/bin/env python3
import sysdef check_security():
with open('skill.py', 'r') as f:
content = f.read()
issues = []
# Check patterns
checks = [
("Network", ["requests", "urllib", "http.client", "socket"]),
("Dynamic", ["eval(", "exec(", "compile(", "__import__("]),
("Subprocess", ["subprocess", "os.system", "shell=True"]),
("File writes", ["open(", "'w'", '"w"', "'wb'", '"wb"']),
]
for check_name, patterns in checks:
for pattern in patterns:
if pattern in content:
issues.append(f"{check_name}: {pattern}")
if issues:
print("Security issues found:")
for issue in issues:
print(f" - {issue}")
return False
else:
print("All security checks passed")
return True
if __name__ == "__main__":
if check_security():
sys.exit(0)
else:
sys.exit(1)
Expected Results:
- Command line checks: No output (no matches found)
- Bandit scan: No issues identified
- Manual verification: All checks passed
Version History
v3.5.4 (2026-04-10)
- Version bump for complete security fixes
- All ClawHub scan issues resolved
- Ready for final submission
v3.5.2 (2026-04-10)
- Fixed contradictory "no file system access" declaration
- Added accurate "read-only file access" description
- Responded to ClawHub security scan feedback
v3.5.1 (2026-04-10)
- Removed all eval(), exec(), compile() calls
- Removed all file write operations
- Removed all network access
- Removed all subprocess calls
v3.5.0 (2026-04-09)
- Initial release (had security issues)
- Full mathematical audit framework
- Multiple security risks identified
- ClawHub scan: SUSPICIOUS
License
MIT License - Free to use, modify, and distribute.
免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制