We Scanned 500 ClawHub Skills. Here's What We Found.
50 dangerous. 100 risky. 284 badges issued. The first independent security audit of the ClawHub ecosystem.
February 24, 2026 · 10 min read · Tork Network Team
ClawHub is the largest registry for OpenClaw skills — thousands of community-built tools that give AI agents access to databases, APIs, file systems, and more. After 900+ malicious skills were detected in the ecosystem, we wanted to understand the full picture.
So we built tork-scan — a free, open-source CLI that checks skill directories against 19 risk patterns — and pointed it at 500 ClawHub skills. This is the first independent, systematic security audit of the ClawHub ecosystem.
Here's what we found.
The Numbers
What “DANGEROUS” Looks Like
50 skills scored below 50 out of 100. These aren't governance gaps — they're active threats. Here are the most alarming patterns we found:
Opens a reverse connection back to an attacker-controlled server. Once active, the attacker has full control of the host machine. Found in skills disguised as cryptocurrency utilities.
Contains a Base64-encoded string over 100 characters decoded at runtime. This is the #1 technique for hiding malicious code in plain sight. The skill name looks innocent — the payload isn't.
Sends data to known command-and-control domains (webhook.site, pipedream.net). A "logger" that logs your data to an attacker's server.
Executes arbitrary shell commands with user privileges. Combined with network access, this enables full system compromise — downloading and running any payload the attacker wants.
Reads ~/.ssh/id_rsa, .env files, or credentials.json. A "configuration manager" that's actually harvesting your SSH keys and API tokens.
Accesses process.env.API_KEY, process.env.SECRET, process.env.TOKEN. Extracts credentials from environment variables and sends them to external endpoints.
Notice the pattern: the most dangerous skills often have the most innocent names. “helpful-utils”, “simple-logger”, “auto-updater” — these are typosquatting attacks, designed to be installed by developers who don't look too closely.
The CAUTION Zone — Legitimate But Flagged
150 skills scored between 70 and 89. These aren't malicious — they're legitimate tools by good developers who just didn't think about governance. The most common issues:
No documentation means no transparency about what the skill does or how it handles data
Legal ambiguity for anyone integrating the skill into production systems
Requesting network.unrestricted or shell.execute without justification
Dotfiles that aren't standard (.gitignore, .env.example) raise questions
This is exactly the gap Tork fills. These are good skills that deserve to demonstrate they're trustworthy. A trust badge says “this skill has been independently scanned and scored” — helping good developers stand out from the noise.
What tork-scan Detects: 19 Risk Patterns
Every skill is scanned against 19 patterns across four severity levels. Here's the complete list:
The Trust Badge System
284 out of 500 skills — every skill scoring 70 or above — earned a “Tork Scanned” trust badge. These badges are:
Cryptographically verifiable — not self-issued. Each badge has a unique ID and verification hash.
Publicly checkable — anyone can verify a badge at tork.network/badge/[id].
Score-aware — badges include the scan score, findings summary, and scan date.
Time-limited — badges expire after one year to ensure ongoing compliance.
This is the beginning of a trust layer for the AI agent ecosystem. When you see a trust badge, you know an independent third party has scanned and scored that skill. When you don't see one, you should ask why.
Issue a badge for your own skills →
What This Means
30% of ClawHub skills had significant security or governance issues. 10% were actively dangerous. And these are just the 500 we scanned — the full registry has over 12,000 skills.
The ecosystem is growing faster than manual review can keep up. Automated, independent scanning is the only scalable solution.
Every skill that installs in your agent's context has full access to your data. It can read files, make network requests, execute code, and access credentials. The supply chain risk in AI agents mirrors early npm and PyPI — before lockfiles, before npm audit, before security scanning became standard.
The difference is that AI agents are often more powerful than a typical npm package. They have tool access. They make autonomous decisions. And they handle sensitive user data in real time.
We're not waiting for the ecosystem to catch up. We built the scanner, ran the audit, and published the results. The full leaderboard is public.
Scan Your Own Skills
tork-scan is free and open-source. No account required:
npx tork-scan ./my-skill
# Scan with JSON output for CI/CD
npx tork-scan ./my-skill --json
See the full leaderboard — 500 skills, ranked and searchable
Add governance to your agent — Get started in 5 minutes
Read the integration guide — Guides for 6 frameworks
Get a trust badge — Issue from your dashboard
Tork Network Pty Ltd — Sydney, Australia