Security

What ClawProd Scans For

OpenClaw skills have direct access to agent memory, network resources, and user data. A single malicious or poorly written skill can compromise an entire agent. ClawProd catches these issues before they ship — not after.

Prompt Injection Detection

Skills can manipulate agent behavior by injecting hidden instructions into prompts. ClawProd scans skill output templates, system messages, and dynamic string construction for patterns that attempt to override agent instructions or extract sensitive context.

Examples detected:

  • Hidden instructions embedded in skill responses
  • Template strings that override system prompts
  • Dynamic content that escalates skill privileges at runtime

Data Exfiltration Detection

Skills with network access can silently send agent memory, conversation history, or user data to external endpoints. ClawProd traces all network calls and flags any that include agent context, memory references, or user data in request bodies or URLs.

Examples detected:

  • HTTP requests containing memory file contents
  • Encoded agent context in query parameters
  • Webhook payloads with conversation history

Permission Escalation Detection

Skills declare permissions in their manifest, but code can attempt to access capabilities beyond what is declared. ClawProd performs static analysis to verify that a skill only accesses the APIs and resources matching its declared permissions.

Examples detected:

  • Filesystem access not declared in manifest
  • Network calls from a skill that only declares memory access
  • Attempts to modify other skills or agent configuration

Shift-Left vs. Post-Publication

Most security approaches for OpenClaw skills are reactive — they scan published skills on ClawHub and flag issues after users have already installed them. By then, the damage may be done.

ClawProd shifts security left into the development pipeline. Every push triggers a scan. Vulnerable skills never reach ClawHub. Developers get actionable feedback while the code is fresh in their minds, not weeks later in a security advisory.

The result: faster fixes, fewer incidents, and higher trust in the skills your agents depend on.