Caelguard: Open-source security scanner for OpenClaw skills

Caelguard is an open-source security scanner designed specifically for the OpenClaw ecosystem that runs locally without network calls. It automates checking for security vulnerabilities in skills published on ClawHub.
Security findings from OpenClaw research
The research identified that the barrier to publish a skill on ClawHub is minimal: only a SKILL markdown file and a week-old GitHub account are required, with no code signing or review process. Skills inherit full agent permissions including shell access, filesystem read/write, and credential access.
Analysis found that roughly 1 in 5 published skills contains concerning security issues:
- Prompt injection
- Credential harvesting
- Obfuscated payloads
- Data exfiltration patterns
Specific patterns to watch for
The scanner checks for these specific indicators of compromise in installed skills:
- Base64 blobs in markdown files (common obfuscation technique)
- Zero-width characters or Unicode tag range (U+E0000) in SKILL markdown
- Prerequisites that ask users to run curl commands or disable security settings
- Scripts that access sensitive directories and files including
.ssh/,.env, orauth-profiles.json - Socket connections or
/dev/tcppatterns in any script exec/evalcalls with string concatenation
Tool details
Caelguard is available under MIT license at github.com/Justincredible-tech/caelguard-community. The tool runs locally and makes no network calls, ensuring privacy during security audits.
📖 Read the full source: r/openclaw
👀 See Also

AI Vulnerability Discovery Outpacing Patch Deployment Times
A security expert argues that AI tools like Mythos will find vulnerabilities faster than fixes can be deployed, citing Log4j data showing average remediation times of 17 days and a decade-long elimination timeline.

Zero-Trust OpenClaw Architecture Adds Pre-Execution Authorization and Post-Execution Verification
An open-source architecture for OpenClaw adds two security checkpoints: a Rust sidecar that intercepts tool calls before execution with sub-millisecond authorization overhead, and deterministic post-execution verification using assertions instead of LLM judgment. The system includes tracing with DOM snapshots and screenshots, plus a DOM compression skill that reduces token usage by 90-99%.

AI Chatbots Leaking Real Phone Numbers: The PII Exposure Problem
Chatbots like Gemini, ChatGPT, and Claude are exposing real personal phone numbers due to PII in training data. DeleteMe reports a 400% increase in AI-related privacy requests in seven months.

Security probe results for OpenClaw, PicoClaw, ZeroClaw, IronClaw, and Minion AI agents
A security evaluation of five AI coding agents tested 145 attack payloads across 12 categories including prompt injection, jailbreaking, and data exfiltration. OpenClaw scored 77.8/100 with critical SQL injection vulnerabilities, while Minion improved from 81.2 to 94.4/100 after fixes.