Caelguard: Open-source security scanner for OpenClaw skills

✍️ OpenClawRadar📅 Published: March 1, 2026🔗 Source
Caelguard: Open-source security scanner for OpenClaw skills
Ad

Caelguard is an open-source security scanner designed specifically for the OpenClaw ecosystem that runs locally without network calls. It automates checking for security vulnerabilities in skills published on ClawHub.

Security findings from OpenClaw research

The research identified that the barrier to publish a skill on ClawHub is minimal: only a SKILL markdown file and a week-old GitHub account are required, with no code signing or review process. Skills inherit full agent permissions including shell access, filesystem read/write, and credential access.

Analysis found that roughly 1 in 5 published skills contains concerning security issues:

  • Prompt injection
  • Credential harvesting
  • Obfuscated payloads
  • Data exfiltration patterns
Ad

Specific patterns to watch for

The scanner checks for these specific indicators of compromise in installed skills:

  • Base64 blobs in markdown files (common obfuscation technique)
  • Zero-width characters or Unicode tag range (U+E0000) in SKILL markdown
  • Prerequisites that ask users to run curl commands or disable security settings
  • Scripts that access sensitive directories and files including .ssh/, .env, or auth-profiles.json
  • Socket connections or /dev/tcp patterns in any script
  • exec/eval calls with string concatenation

Tool details

Caelguard is available under MIT license at github.com/Justincredible-tech/caelguard-community. The tool runs locally and makes no network calls, ensuring privacy during security audits.

📖 Read the full source: r/openclaw

Ad

👀 See Also

AI Vulnerability Discovery Outpacing Patch Deployment Times
Security

AI Vulnerability Discovery Outpacing Patch Deployment Times

A security expert argues that AI tools like Mythos will find vulnerabilities faster than fixes can be deployed, citing Log4j data showing average remediation times of 17 days and a decade-long elimination timeline.

OpenClawRadar
Zero-Trust OpenClaw Architecture Adds Pre-Execution Authorization and Post-Execution Verification
Security

Zero-Trust OpenClaw Architecture Adds Pre-Execution Authorization and Post-Execution Verification

An open-source architecture for OpenClaw adds two security checkpoints: a Rust sidecar that intercepts tool calls before execution with sub-millisecond authorization overhead, and deterministic post-execution verification using assertions instead of LLM judgment. The system includes tracing with DOM snapshots and screenshots, plus a DOM compression skill that reduces token usage by 90-99%.

OpenClawRadar
AI Chatbots Leaking Real Phone Numbers: The PII Exposure Problem
Security

AI Chatbots Leaking Real Phone Numbers: The PII Exposure Problem

Chatbots like Gemini, ChatGPT, and Claude are exposing real personal phone numbers due to PII in training data. DeleteMe reports a 400% increase in AI-related privacy requests in seven months.

OpenClawRadar
Security probe results for OpenClaw, PicoClaw, ZeroClaw, IronClaw, and Minion AI agents
Security

Security probe results for OpenClaw, PicoClaw, ZeroClaw, IronClaw, and Minion AI agents

A security evaluation of five AI coding agents tested 145 attack payloads across 12 categories including prompt injection, jailbreaking, and data exfiltration. OpenClaw scored 77.8/100 with critical SQL injection vulnerabilities, while Minion improved from 81.2 to 94.4/100 after fixes.

OpenClawRadar