- ClawSec Scanner
- Comprehensive security scanner for agent platforms that automates vulnerability detection across multiple dimensions:
- Dependency Scanning
-
- Analyzes npm and Python dependencies using
- npm audit
- and
- pip-audit
- with structured JSON output parsing
- CVE Database Integration
-
- Queries OSV (primary), NVD 2.0, and GitHub Advisory Database for vulnerability enrichment
- SAST Analysis
-
- Static code analysis using Semgrep (JavaScript/TypeScript) and Bandit (Python) to detect hardcoded secrets, command injection, path traversal, and unsafe deserialization
- DAST Framework
-
- Agent-specific dynamic analysis with real OpenClaw hook execution harness (malicious input, timeout, output bounds, event mutation safety)
- Unified Reporting
-
- Consolidated vulnerability reports with severity classification and remediation guidance
- Continuous Monitoring
-
- OpenClaw hook integration for automated periodic scanning
- Features
- Multi-Engine Scanning
- The scanner orchestrates four complementary scan types to provide comprehensive vulnerability coverage:
- Dependency Scanning
- Executes
- npm audit --json
- and
- pip-audit -f json
- as subprocesses
- Parses structured output to extract CVE IDs, severity, affected versions
- Handles edge cases: missing package-lock.json, zero vulnerabilities, malformed JSON
- CVE Database Queries
- OSV API
- (primary): Free, no authentication, broad ecosystem support (npm, PyPI, Go, Maven)
- NVD 2.0
- (optional): Requires API key to avoid 6-second rate limiting
- GitHub Advisory Database
- (optional): GraphQL API with OAuth token
- Normalizes all API responses to unified
- Vulnerability
- schema
- Static Analysis (SAST)
- Semgrep
- for JavaScript/TypeScript: Detects security issues using
- --config auto
- or
- --config p/security-audit
- Bandit
- for Python: Leverages existing
- pyproject.toml
- configuration
- Identifies: hardcoded secrets (API keys, tokens), command injection (
- eval
- ,
- exec
- ), path traversal, unsafe deserialization
- Dynamic Analysis (DAST)
- Real hook execution harness for OpenClaw hook handlers discovered from
- HOOK.md
- metadata
- Verifies: malicious input resilience, timeout behavior, output amplification bounds, and core event mutation safety
- Note: Traditional web DAST tools (ZAP, Burp) do not apply to agent platforms - this provides agent-specific testing
- Unified Reporting
- All scan types emit a consistent
- ScanReport
- JSON schema:
- {
- scan_id
- :
- string
- ;
- // UUID
- timestamp
- :
- string
- ;
- // ISO 8601
- target
- :
- string
- ;
- // Scanned path
- vulnerabilities
- :
- Vulnerability
- [
- ]
- ;
- summary
- :
- {
- critical
- :
- number
- ;
- high
- :
- number
- ;
- medium
- :
- number
- ;
- low
- :
- number
- ;
- info
- :
- number
- ;
- }
- }
- Each
- Vulnerability
- object includes:
- id
-
- CVE-2023-12345 or GHSA-xxxx-yyyy-zzzz
- source
-
- npm-audit | pip-audit | osv | nvd | github | sast | dast
- severity
-
- critical | high | medium | low | info
- package
-
- Package name (or 'N/A' for SAST/DAST)
- version
-
- Affected version
- fixed_version
-
- First version with fix (if available)
- title
-
- Short description
- description
-
- Full advisory text
- references
-
- URLs for more info
- discovered_at
- ISO 8601 timestamp OpenClaw Integration Automated continuous monitoring via hook: Runs scanner on configurable interval (default: 86400s / 24 hours) Triggers on agent:bootstrap and command:new events Posts findings to event.messages array with severity summary Rate-limited by CLAWSEC_SCANNER_INTERVAL environment variable Installation Prerequisites Verify required binaries are available:
Core runtimes
node --version
v20+
npm --version python3 --version
3.10+
Scanning tools
pip-audit --version
Install: uv pip install pip-audit
semgrep --version
Install: pip install semgrep OR brew install semgrep
bandit --version
Install: uv pip install bandit
Utilities
jq --version curl --version Option A: Via clawhub (recommended) npx clawhub@latest install clawsec-scanner Option B: Manual installation with verification set -euo pipefail VERSION = " ${SKILL_VERSION :? Set SKILL_VERSION (e.g. 0.1.0)} " INSTALL_ROOT = " ${INSTALL_ROOT :- $HOME / .openclaw / skills} " DEST = " $INSTALL_ROOT /clawsec-scanner" BASE = "https://github.com/prompt-security/clawsec/releases/download/clawsec-scanner-v ${VERSION} " TEMP_DIR = " $( mktemp -d ) " trap 'rm -rf "$TEMP_DIR"' EXIT
Pinned release-signing public key
Fingerprint (SHA-256 of SPKI DER): 711424e4535f84093fefb024cd1ca4ec87439e53907b305b79a631d5befba9c8
cat
" $TEMP_DIR /release-signing-public.pem" << 'PEM' -----BEGIN PUBLIC KEY----- MCowBQYDK2VwAyEAS7nijfMcUoOBCj4yOXJX+GYGv2pFl2Yaha1P4v5Cm6A= -----END PUBLIC KEY----- PEM ZIP_NAME = "clawsec-scanner-v ${VERSION} .zip"
Download release archive + signed checksums
curl -fsSL " $BASE / $ZIP_NAME " -o " $TEMP_DIR / $ZIP_NAME " curl -fsSL " $BASE /checksums.json" -o " $TEMP_DIR /checksums.json" curl -fsSL " $BASE /checksums.sig" -o " $TEMP_DIR /checksums.sig"
Verify checksums manifest signature
openssl base64 -d -A -in " $TEMP_DIR /checksums.sig" -out " $TEMP_DIR /checksums.sig.bin" if ! openssl pkeyutl -verify \ -pubin \ -inkey " $TEMP_DIR /release-signing-public.pem" \ -sigfile " $TEMP_DIR /checksums.sig.bin" \ -rawin \ -in " $TEMP_DIR /checksums.json"
/dev/null 2
&1 ; then echo "ERROR: checksums.json signature verification failed"
&2 exit 1 fi EXPECTED_SHA = " $( jq -r '.archive.sha256 // empty' " $TEMP_DIR /checksums.json" ) " if [ -z " $EXPECTED_SHA " ] ; then echo "ERROR: checksums.json missing archive.sha256"
&2 exit 1 fi ACTUAL_SHA = " $( shasum -a 256 " $TEMP_DIR / $ZIP_NAME " | awk '{print $1}' ) " if [ " $EXPECTED_SHA " != " $ACTUAL_SHA " ] ; then echo "ERROR: Archive checksum mismatch"
&2 exit 1 fi echo "Checksums verified. Installing..." mkdir -p " $INSTALL_ROOT " rm -rf " $DEST " unzip -q " $TEMP_DIR / $ZIP_NAME " -d " $INSTALL_ROOT " chmod 600 " $DEST /skill.json" find " $DEST " -type f ! -name "skill.json" -exec chmod 644 { } \ ; echo "Installed clawsec-scanner v ${VERSION} to: $DEST " echo "Next step: Run a scan or set up continuous monitoring" Usage On-Demand CLI Scanning SCANNER_DIR = " ${INSTALL_ROOT :- $HOME / .openclaw / skills} /clawsec-scanner"
Scan all skills with JSON output
" $SCANNER_DIR /scripts/runner.sh" --target ./skills/ --output report.json --format json
Scan specific directory with human-readable output
" $SCANNER_DIR /scripts/runner.sh" --target ./my-skill/ --format text
Check available flags
- "
- $SCANNER_DIR
- /scripts/runner.sh"
- --help
- CLI Flags:
- --target
-
- Directory to scan (required)
- --output
-
- Write results to file (optional, defaults to stdout)
- --format
-
- Output format (default: json)
- --check
- Verify all required binaries are installed OpenClaw Hook Setup (Continuous Monitoring) Enable automated periodic scanning: SCANNER_DIR = " ${INSTALL_ROOT :- $HOME / .openclaw / skills} /clawsec-scanner" node " $SCANNER_DIR /scripts/setup_scanner_hook.mjs" This creates a hook that: Scans on agent:bootstrap and command:new events Respects CLAWSEC_SCANNER_INTERVAL rate limiting (default: 86400 seconds / 24 hours) Posts findings to conversation with severity summary Recommends remediation for high/critical vulnerabilities Restart the OpenClaw gateway after enabling the hook, then run /new to trigger an immediate scan. Environment Variables
Optional - NVD API key to avoid rate limiting (6-second delays without key)
export CLAWSEC_NVD_API_KEY = "your-nvd-api-key"
Optional - GitHub OAuth token for Advisory Database queries
export GITHUB_TOKEN = "ghp_your_token_here"
Optional - Scanner hook interval in seconds (default: 86400 / 24 hours)
export CLAWSEC_SCANNER_INTERVAL = "86400"
Optional - Allow unsigned advisory feed during development (from clawsec-suite)
export CLAWSEC_ALLOW_UNSIGNED_FEED = "1" Architecture Modular Design Each scan type is an independent module that can run standalone or as part of unified scan: scripts/runner.sh # Orchestration layer ├── scan_dependencies.mjs # npm audit + pip-audit ├── query_cve_databases.mjs # OSV/NVD/GitHub API queries ├── sast_analyzer.mjs # Semgrep + Bandit static analysis ├── dast_runner.mjs # Dynamic security testing orchestration └── dast_hook_executor.mjs # Isolated real hook execution harness lib/ ├── report.mjs # Result aggregation and formatting ├── utils.mjs # Subprocess exec, JSON parsing, error handling └── types.ts # TypeScript schema definitions hooks/clawsec-scanner-hook/ ├── HOOK.md # OpenClaw hook metadata └── handler.ts # Periodic scan trigger Fail-Open Philosophy The scanner prioritizes availability over strict failure propagation: Network failures → emit partial results, log warnings Missing tools → skip that scan type, continue with others Malformed JSON → parse what's valid, log errors API rate limits → implement exponential backoff, fallback to other sources Zero vulnerabilities → emit success report with empty array Critical failures that exit immediately: Target path does not exist No scanning tools available (all bins missing) Concurrent scan detected (lockfile present) Subprocess Execution Pattern All external tools run as subprocesses with structured JSON output: import { spawn } from 'node:child_process' ; // Example: npm audit execution const proc = spawn ( 'npm' , [ 'audit' , '--json' ] , { cwd : targetPath , stdio : [ 'ignore' , 'pipe' , 'pipe' ] } ) ; // Handle non-zero exit codes gracefully // npm audit exits 1 when vulnerabilities found (not an error!) proc . on ( 'close' , code => { if ( code !== 0 && stderr . includes ( 'ERR!' ) ) { // Actual error reject ( new Error ( stderr ) ) ; } else { // Vulnerabilities found or success resolve ( JSON . parse ( stdout ) ) ; } } ) ; Troubleshooting Common Issues "Missing package-lock.json" warning npm audit requires lockfile to run Run npm install in target directory to generate Scanner continues with other scan types if npm audit fails "NVD API rate limit exceeded" Set CLAWSEC_NVD_API_KEY environment variable Without API key: 6-second delays enforced between requests OSV API used as primary source (no rate limits) "pip-audit not found" Install: uv pip install pip-audit or pip install pip-audit Verify: which pip-audit Add to PATH if installed in non-standard location "Semgrep binary missing" Install: pip install semgrep OR brew install semgrep Requires Python 3.8+ runtime Alternative: use Docker image returntocorp/semgrep "TypeScript hook not executable in DAST harness" The DAST harness executes real hook handlers and transpiles handler.ts files when a TypeScript compiler is available Install TypeScript in the scanner environment: npm install -D typescript (or provide handler.js / handler.mjs ) Without a compiler, scanner reports an info -level coverage finding instead of a high-severity vulnerability "Concurrent scan detected" Lockfile exists: /tmp/clawsec-scanner.lock Wait for running scan to complete or manually remove lockfile Prevents overlapping scans that could produce inconsistent results Verification Check scanner is working correctly:
Verify required binaries
./scripts/runner.sh --check
Run unit tests
node test/dependency_scanner.test.mjs node test/cve_integration.test.mjs node test/sast_engine.test.mjs node test/dast_harness.test.mjs
Validate skill structure
python .. / .. /utils/validate_skill.py .
Scan test fixtures (should detect known vulnerabilities)
./scripts/runner.sh --target test/fixtures/ --format text Development Running Tests
All tests (vanilla Node.js, no framework)
for test in test/*.test.mjs ; do node " $test " || exit 1 done
Individual test suites
node test/dependency_scanner.test.mjs
Dependency scanning
node test/cve_integration.test.mjs
CVE database APIs
node test/sast_engine.test.mjs
Static analysis
node test/dast_harness.test.mjs
DAST harness execution
Linting
JavaScript/TypeScript
npx eslint . --ext .ts,.tsx,.js,.jsx,.mjs --max-warnings 0
Python (Bandit already configured in pyproject.toml)
ruff check . bandit -r . -ll
Shell scripts
- shellcheck
- scripts/*.sh
- Adding Custom Semgrep Rules
- Create custom rules in
- .semgrep/rules/
- :
- rules
- :
- -
- id
- :
- custom
- -
- security
- -
- rule
- pattern
- :
- dangerous_function($ARG)
- message
- :
- Avoid dangerous_function
- -
- use safe_alternative instead
- severity
- :
- WARNING
- languages
- :
- [
- javascript
- ,
- typescript
- ]
- Update
- scripts/sast_analyzer.mjs
- to include custom rules:
- const
- proc
- =
- spawn
- (
- 'semgrep'
- ,
- [
- 'scan'
- ,
- '--config'
- ,
- 'auto'
- ,
- '--config'
- ,
- '.semgrep/rules/'
- ,
- // Add custom rules
- '--json'
- ,
- targetPath
- ]
- )
- ;
- Integration with ClawSec Suite
- The scanner works standalone or as part of the ClawSec ecosystem:
- clawsec-suite
-
- Meta-skill that can install and manage clawsec-scanner
- clawsec-feed
-
- Advisory feed for malicious skill detection (complementary)
- openclaw-audit-watchdog
- Cron-based audit automation (similar pattern) Install the full ClawSec suite: npx clawhub@latest install clawsec-suite
Then use clawsec-suite to discover and install clawsec-scanner
Security Considerations Scanner Security No hardcoded secrets in scanner code API keys read from environment variables only (never logged or committed) Subprocess arguments use arrays to prevent shell injection All external tool output parsed with try/catch error handling Vulnerability Prioritization Critical/High severity findings should be addressed immediately: Known exploits in dependencies (CVSS 9.0+) Hardcoded API keys or credentials in code Command injection vulnerabilities Path traversal without validation Medium/Low severity findings can be addressed in normal sprint cycles: Outdated dependencies without known exploits Missing security headers Weak cryptography usage Info findings are advisory only: Deprecated API usage Code quality issues flagged by linters Roadmap v0.0.2 (Current) Dependency scanning (npm audit, pip-audit) CVE database integration (OSV, NVD, GitHub Advisory) SAST analysis (Semgrep, Bandit) Real OpenClaw hook execution harness for DAST Unified JSON reporting OpenClaw hook integration Future Enhancements Automatic remediation (dependency upgrades, code fixes) SARIF output format for GitHub Code Scanning integration Web dashboard for vulnerability tracking over time CI/CD GitHub Action for PR blocking on high-severity findings Container image scanning (Docker, OCI) Infrastructure-as-Code scanning (Terraform, CloudFormation) Comprehensive agent workflow DAST (requires deeper platform integration) Contributing Found a security issue? Please report privately to security@prompt.security . For feature requests and bug reports, open an issue at: https://github.com/prompt-security/clawsec/issues License AGPL-3.0-or-later See LICENSE file in repository root for full text. Resources ClawSec Homepage : https://clawsec.prompt.security Documentation : https://clawsec.prompt.security/scanner GitHub Repository : https://github.com/prompt-security/clawsec OSV API Docs : https://osv.dev/docs/ NVD API Docs : https://nvd.nist.gov/developers/vulnerabilities Semgrep Registry : https://semgrep.dev/explore Bandit Documentation : https://bandit.readthedocs.io/