📦 Runtime Security Guard (English) — 安全防护工具

v2.1.0

安全性 protection v2.1. 提供 410+ 安全性 rules 使用 cross-平台 detection (Windows/macOS/Linux), detecting 10 categori...

0· 123·0 当前·0 累计
下载技能包
License
MIT
0
安全扫描
VirusTotal
可疑
查看报告
OpenClaw
可疑
medium confidence
The skill broadly matches a runtime-security tool (hooks, detectors, web UI) but contains installation and configuration behaviors that are not declared (remote install scripts, missing Node/npm requirement, webhook/honeypot features, prompt-injection strings in SKILL.md), so it needs manual review before use.
评估建议
What to check before installing: - Verify the repository owner and source: confirm the GitHub repo (https://github.com/nanlin300624/runtime-security-guard) is trustworthy and review author identity and issues/commits. Do not trust the skill solely because it is on GitHub. - Do NOT run curl | bash on a raw URL without auditing the script. Instead clone the repo and inspect install-no-sudo.sh and other scripts locally before running. Prefer building locally (npm install; npm run build) in an isol...
详细分析 ▾
用途与能力
The name/description align with the included code: hook layers, detectors, rule engine, web dashboard and honeypot features are appropriate for a runtime security guard. However the package metadata declares no required runtime/binaries or env vars while the code/architecture docs explicitly require Node.js (v18+) and other runtime assumptions — this mismatch is incoherent and should be corrected. The presence of honeypot features (GitHub/OpenAI/AWS token traps) and OS-specific monitors (macOS keychain/launchagents) is consistent with the stated purpose but implies access to sensitive subsystems.
指令范围
SKILL.md instructs users to run remote install scripts (curl|bash from raw.githubusercontent.com) and to copy files into the OpenClaw skills dir. The skill's hooks include events that intercept file reads, tool results, user input and agent responses — appropriate for a security guard but highly invasive. The SKILL.md mentions 'Save configuration online' and the code accepts a configurable webhook (config.webhookUrl) — yet no external endpoints or env vars are declared in metadata. The SKILL.md also contains prompt-injection example strings; while those may be test cases, any prompt-injection content inside runtime instructions can be abused if not sanitized.
安装机制
No formal install spec in registry metadata, but SKILL.md recommends running a remote install script piped to bash from GitHub raw (install-no-sudo.sh). Pipe-to-shell of remote scripts is high-risk and should be avoided unless you audit the script. Alternative instructions clone/build locally (git clone + npm install + npm run build) which is expected, but the manifest failing to declare Node/npm as required is an inconsistency.
凭证需求
The skill declares no required environment variables or primary credential, but the code references optional external webhook configuration and includes honeypot modules intended to capture tokens (OpenAI, GitHub, AWS, etc.). The SKILL.md promises 'automatic environment variable configuration' which could modify env vars without declaring them. Requesting or capturing wide-ranging secrets is not justified by the metadata and increases risk if defaults enable webhook/external forwarding.
持久化与权限
The skill is not marked always:true and does not request special platform flags in metadata. It installs into the user's OpenClaw skills directory and registers runtime hooks that intercept many agent events — this is expected for a runtime protection skill but grants broad visibility into agent activity (file reads, tool outputs, user inputs). Combined with undeclared network/webhook capabilities, this broad access raises concern and warrants review prior to production deployment.
build-complete/scripts/check-install.js:59
Shell command execution detected (child_process).
build-complete/scripts/test-interception.js:54
Shell command execution detected (child_process).
build-complete/src/monitor/macos/gatekeeper-monitor.ts:34
Shell command execution detected (child_process).
build-complete/src/monitor/macos/keychain-monitor.ts:87
Shell command execution detected (child_process).
build-complete/src/monitor/macos/permissions-monitor.ts:81
Shell command execution detected (child_process).
build-complete/src/monitor/network-monitor.ts:91
Shell command execution detected (child_process).
build-complete/src/monitor/process-monitor.ts:85
Shell command execution detected (child_process).
build-complete/src/utils/platform.ts:133
Shell command execution detected (child_process).
build/scripts/check-install.js:59
Shell command execution detected (child_process).
build/src/monitor/macos/gatekeeper-monitor.ts:34
Shell command execution detected (child_process).
build/src/monitor/macos/keychain-monitor.ts:87
Shell command execution detected (child_process).
build/src/monitor/macos/permissions-monitor.ts:81
Shell command execution detected (child_process).
build/src/monitor/network-monitor.ts:91
Shell command execution detected (child_process).
build/src/monitor/process-monitor.ts:85
Shell command execution detected (child_process).
build/src/utils/platform.ts:133
Shell command execution detected (child_process).
scripts/check-install.js:59
Shell command execution detected (child_process).
scripts/test-interception.js:54
Shell command execution detected (child_process).
src/monitor/macos/gatekeeper-monitor.ts:34
Shell command execution detected (child_process).
src/monitor/macos/keychain-monitor.ts:87
Shell command execution detected (child_process).
src/monitor/macos/permissions-monitor.ts:81
Shell command execution detected (child_process).
src/monitor/network-monitor.ts:91
Shell command execution detected (child_process).
src/monitor/process-monitor.ts:85
Shell command execution detected (child_process).
src/utils/platform.ts:133
Shell command execution detected (child_process).
build-complete/scripts/web-admin-modern.js:11
Environment variable access combined with network send.
build-complete/scripts/web-server-v2.js:17
Environment variable access combined with network send.
build/scripts/web-admin-modern.js:11
Environment variable access combined with network send.
scripts/web-admin-modern.js:11
Environment variable access combined with network send.
scripts/web-server-v2.js:17
Environment variable access combined with network send.
build-complete/scripts/web-admin-modern.js:56
File read combined with network send (possible exfiltration).
build-complete/scripts/web-server-v2.js:45
File read combined with network send (possible exfiltration).
build-complete/src/rules/patterns/supplyChain.ts:138
File read combined with network send (possible exfiltration).
build/scripts/web-admin-modern.js:56
File read combined with network send (possible exfiltration).
build/src/rules/patterns/supplyChain.ts:138
File read combined with network send (possible exfiltration).
scripts/web-admin-modern.js:56
File read combined with network send (possible exfiltration).
scripts/web-server-v2.js:45
File read combined with network send (possible exfiltration).
src/rules/patterns/supplyChain.ts:138
File read combined with network send (possible exfiltration).
build-complete/docs/AUTO-TEST.md:147
Prompt-injection style instruction pattern detected.
build-complete/RULES-EXPANDED.md:189
Prompt-injection style instruction pattern detected.
build-complete/tests/samples.md:40
Prompt-injection style instruction pattern detected.
docs/AUTO-TEST.md:147
Prompt-injection style instruction pattern detected.
RULES-EXPANDED.md:189
Prompt-injection style instruction pattern detected.
TEST-REPORT.md:95
Prompt-injection style instruction pattern detected.
TEST-RESULT.md:78
Prompt-injection style instruction pattern detected.
tests/samples.md:40
Prompt-injection style instruction pattern detected.
VERSION.md:270
Prompt-injection style instruction pattern detected.
安全有层次,运行前请审查代码。

License

MIT

可自由使用、修改和再分发,需保留版权声明。

运行时依赖

无特殊依赖

版本

latestv2.1.0

v2.1.0 (2026-03-26)

可疑

安装命令

点击复制
官方npx clawhub@latest install runtime-security-guard-en
镜像加速npx clawhub@latest install runtime-security-guard-en --registry https://cn.longxiaskill.com
数据来源ClawHub ↗ · 中文优化:龙虾技能库