Openclaw Skills
Browse skills
Security Guide

How to Tell If an Openclaw Skill Is Risky

A practical guide to evaluating the security risk of any Openclaw skill before you install it.

Updated 3/28/2026

Why Skill Safety Matters

Installing an Openclaw skill means giving third-party code access to your system. Some skills are perfectly safe — they just process text or generate charts. Others can execute shell commands, read your files, or make network requests to unknown servers.

Understanding how to evaluate risk before installing is essential.

The Risk Assessment Framework

We evaluate every skill across six dimensions:

1. Repository Health A well-maintained repository signals active, responsible development: - Regular commits and releases - Responsive issue handling - Clear documentation - Multiple contributors

2. Dependency Risk Skills with many dependencies inherit their vulnerabilities: - Fewer dependencies means lower risk - Known vulnerabilities in dependencies are flagged - Outdated dependencies are a warning sign

3. Secret Exposure Does the skill handle secrets properly? - API keys should never be hardcoded - Secrets should use environment variables - No credential logging

4. Dangerous Patterns Code that can cause harm: - Shell command execution - Filesystem write access - Dynamic code evaluation - Unrestricted network access

5. Configuration Safety Can the skill be misconfigured in dangerous ways? - Overly broad permissions by default - Insecure default settings - Missing input validation

6. External Reputation What does the community say? - Download counts and star ratings - Issue reports and resolution - Security disclosure history

Quick Decision Guide

Install confidently if the skill: - Has a display score above 85 - Has risk_level: low - Requires no shell access or filesystem writes - Has recent commits and clean audit results

Install with caution if the skill: - Has risk_level: medium - Requires API keys or network access - Has a display score between 60-85

Avoid or sandbox if the skill: - Has risk_level: high - Requires shell execution or Docker access - Has a display score below 60 - Shows unresolved security issues

Common Risk Patterns

Shell Execution

Skills that run shell commands can execute arbitrary code on your system.\nFilesystem Access: Read/write access to your files creates data exposure and data loss risk.\nNetwork Requests: Unrestricted network access could exfiltrate data or reach internal services.\nDocker Socket: Docker socket access provides near-root capabilities.\nDynamic Eval: Skills using eval() or similar can execute injected code.\nCredential Handling: Poor secret management risks exposing API keys and tokens.

Safety Checklist

High Risk Signals

requires_shell_commands = true

The skill can execute arbitrary system commands\nrequires_local_apps = true AND requires_shell_commands = true: Combined system access risk\ndangerous_pattern_score below 6: Automated scanners found concerning code patterns\nrepo_health_score below 6: Repository maintenance is below minimum standards\nmaintainer_signal_score below 5: Maintainer may be inactive or unresponsive\npublish_decision = needs_review: Our system flagged this skill for manual review

Skills Referenced in This Article

Check skill safety now

Every skill in our directory includes automated audit evidence.

Browse Skills