npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

clawscan

v1.2.0

Published

Security scanner for OpenClaw skills — detect malicious patterns before installing

Readme

With 341+ malicious skills discovered on ClawHub, ClawScan helps you scan skills before installation to catch credential stealers, reverse shells, obfuscated payloads, and other threats.

Installation

# Clone and install globally
git clone https://github.com/sggolakiya/clawscan.git
cd clawscan
npm install
npm link

# Or run directly
npx clawscan scan ./path-to-skill

Usage

# Scan a local skill directory
clawscan scan ./my-skill

# Scan with verbose output (shows info-level findings)
clawscan scan ./my-skill --verbose

# Output as JSON (for CI/CD pipelines)
clawscan scan ./my-skill --json

# Scan a skill from a URL (downloads and extracts automatically)
clawscan scan https://github.com/user/skill-name/archive/main.zip

Exit Codes

| Code | Meaning | |------|---------| | 0 | 🟢 Safe — no significant issues found | | 1 | 🟡 Warning — suspicious patterns detected, review recommended | | 2 | 🔴 Dangerous — malicious patterns detected, do not install | | 3 | Error — scan could not complete |

What It Detects

🚨 Critical Threats

  • Fake prerequisites — SKILL.md instructing users to download external binaries
  • Credential theft — accessing ~/.clawdbot/.env, ~/.openclaw/, SSH keys, browser data
  • Reverse shells — hidden in scripts (/dev/tcp, nc -e, socat, etc.)
  • Download & executecurl | sh, wget | bash patterns
  • Data exfiltration — Discord webhooks, Telegram bots, known malicious domains
  • Prompt injection — SKILL.md attempting to override agent instructions
  • Obfuscated code — JavaScript obfuscator patterns, base64+exec combos
  • Typosquatting — skill names mimicking popular skills (gltHubgithub)
  • Password-protected archives — classic AV evasion technique
  • Persistence mechanisms — crontab, startup scripts, rc.local modifications

⚠️ Warnings

  • Dynamic code execution (eval, exec, spawn)
  • Network requests to suspicious TLDs (.xyz, .tk, etc.)
  • Raw socket creation
  • Base64 decoding (without execution)
  • Hardcoded secrets and API keys
  • Environment variable access

ℹ️ Informational

  • HTTP request usage
  • Unusual script interpreters
  • Excessive external URLs in SKILL.md

Blocklist

ClawScan maintains a blocklist of known malicious infrastructure from the Koi Security report:

  • IPs: 91.92.242.30 and related ranges
  • Domains: webhook.site, ngrok.io, pipedream.net, and 25+ data exfiltration services
  • Patterns: Discord webhooks, Telegram bot APIs, Slack webhooks

Architecture

clawscan/
├── src/
│   ├── cli.js              # CLI entry point (Commander.js)
│   ├── scanner.js           # Orchestrator — runs analyzers, aggregates results
│   ├── reporter.js          # Terminal output formatting
│   ├── analyzers/
│   │   ├── skill-md.js      # SKILL.md content analysis
│   │   ├── scripts.js       # Script static analysis
│   │   ├── network.js       # Network call & domain detection
│   │   ├── credentials.js   # Credential access detection
│   │   ├── obfuscation.js   # Code obfuscation detection
│   │   └── typosquat.js     # Name similarity checking
│   └── rules/
│       ├── blocklist.json   # Known malicious domains/IPs
│       └── patterns.json    # Detection regex patterns
└── test/
    └── fixtures/            # Test skills (safe + malicious)

Contributing

PRs welcome! To add new detection rules:

  1. Add regex patterns to src/rules/patterns.json
  2. Add domains/IPs to src/rules/blocklist.json
  3. Or create a new analyzer in src/analyzers/

Background

In February 2026, Koi Security reported that 341+ malicious skills were active on ClawHub, primarily published by a single attacker (hightower6eu). Attack vectors included:

  • AMOS Stealer distribution via fake prerequisite downloads
  • Credential exfiltration from ~/.clawdbot/.env
  • Reverse shells hidden in seemingly functional skills
  • Typosquatting of popular skill names

VirusTotal added OpenClaw scanning support, but it's reactive — scanning skills after upload. ClawScan is proactive — scan before you install.

License

MIT


Built with 🔒 by the OpenClaw community. Stay safe out there.