๐Ÿ“š More on this topic: OpenClaw Setup Guide ยท OpenClaw Security Guide ยท Best Models for OpenClaw ยท How OpenClaw Works

OpenClaw’s skill system is what makes it more than a chatbot. Skills give the agent hands โ€” the ability to read your email, commit code, browse the web, manage your calendar, and automate workflows. The 50+ bundled skills cover the basics. ClawHub, the community marketplace, has 3,000+ more.

The problem: ClawHub has zero meaningful moderation. Researchers found 341 malicious skills in a single audit. One coordinated campaign pushed Atomic Stealer malware through fake cryptocurrency and productivity tools. Skills run with whatever permissions your agent has, and your agent probably has access to your shell, your files, and your credentials.

This guide covers what’s safe to install, what to avoid, and how to build your own skills when you don’t trust someone else’s code.


How OpenClaw Skills Work

A skill is a folder containing a SKILL.md file. That file has YAML frontmatter (name, description, requirements) and markdown instructions that tell the agent what the skill does and when to use it. That’s it. No compiled code. No complex framework. Just a text file that the agent reads.

When OpenClaw starts a session, it snapshots all eligible skills and includes their instructions in the agent’s context. Each skill costs roughly 24 tokens plus the length of its instructions. The agent uses these instructions to decide when and how to invoke tools.

Where Skills Live

Skills load from three locations, highest priority first:

LocationPathPurpose
Workspace<workspace>/skills/Project-specific skills
User~/.openclaw/skills/Your personal skills
BundledShipped with OpenClawOfficial, vetted skills

Workspace skills override user skills, which override bundled ones. If you create a skill with the same name as a bundled one, yours takes precedence. This is useful for customizing default behavior โ€” and a potential attack vector if a malicious skill shadows a trusted one.

Skill Requirements and Gating

Skills can declare what they need to function:

---
name: github-integration
description: Manage GitHub repos, issues, and PRs
metadata:
  openclaw:
    requires:
      bins: ["gh"]
      env: ["GITHUB_TOKEN"]
    os: ["darwin", "linux"]
---

If the required binaries aren’t on your PATH or environment variables aren’t set, the skill silently disables itself. This is a smart design โ€” it means your agent context doesn’t fill up with instructions for tools that can’t actually run.


Bundled Skills: Start Here

These ship with OpenClaw and are maintained by the core team. They’re the safest option and cover most common use cases.

Productivity

SkillWhat It DoesRisk Level
email-triageRead, summarize, draft replies, flag urgent messagesMedium โ€” agent reads your email
calendarCreate events, check conflicts, set remindersLow
apple-notesCreate, search, and update Apple NotesLow
apple-remindersManage reminders and due datesLow
screenshotTake and analyze screenshotsLow
pdf-extractorExtract text from PDFsLow

Developer Tools

SkillWhat It DoesRisk Level
github-integrationIssues, PRs, repo management, webhook triggersMedium โ€” needs repo access token
agent-browserHeadless Playwright automation with accessibility treeHigh โ€” can browse anywhere
execRun shell commandsHigh โ€” full system access
file-read / file-writeRead and write files on diskHigh โ€” filesystem access
web-fetch / web-searchMake HTTP requests, search the webMedium โ€” outbound network access
docker-skillContainer managementHigh โ€” Docker socket access

The High-Risk Bundled Skills

Four bundled skills deserve extra caution. They’re not malicious โ€” they’re official and useful โ€” but they give the agent broad access:

  • exec: Shell command execution. The agent can run anything your user can run. Disable unless you need it.
  • agent-browser: Full browser automation. The agent can visit any URL, fill forms, click buttons. Good for research, bad if the agent gets prompt-injected.
  • file-read / file-write: Filesystem access. The agent can read your config files, SSH keys, anything in its path.
  • web-fetch: Outbound HTTP. A compromised agent can exfiltrate data to external servers.

Our OpenClaw Security Guide covers how to restrict these using allowlists and sandboxing. The short version: disable everything you don’t actively need.


ClawHub: The Community Marketplace

ClawHub is OpenClaw’s public skill registry at clawhub.ai. Anyone with a GitHub account (at least one week old) can publish a skill. As of February 2026, it hosts over 3,000 community-built skills with vector-powered search, star ratings, and versioning.

How to Install a ClawHub Skill

# Search for skills
clawhub search "notion"

# Install a skill to your workspace
clawhub install notion-integration

# Update all installed skills
clawhub update --all

Installed skills land in your workspace’s skills/ directory. You can read the SKILL.md before enabling it.

Worth Installing (If You Read the Source First)

These community skills fill gaps that bundled skills don’t cover. Verify the source code before installing any of them.

SkillWhat It DoesWhy It’s Useful
notion-integrationNotion database and page operationsIf you live in Notion, this connects your agent to your workspace
obsidian-vaultRead, search, and manage Obsidian notesPairs well with local-first knowledge management
news-aggregatorAggregates Hacker News, GitHub Trending, Product Hunt, and 5 other sourcesGreat for morning briefings via heartbeat or cron
gitlab-integrationMR and pipeline managementIf your repos are on GitLab instead of GitHub
home-assistantSmart home controlVoice-to-agent-to-home-assistant is genuinely useful
trello-boardsTrello board and card managementLightweight project management integration

What to Avoid

Do not install community skills that:

  • Request permissions they shouldn’t need. A note-taking skill doesn’t need exec or web_fetch. Check the SKILL.md for what tools it tells the agent to use.
  • Have low download counts and no stars. Popularity isn’t a guarantee of safety, but zero community vetting is a red flag.
  • Claim to automate financial transactions. The Koi Security audit found the majority of malicious skills masqueraded as Solana wallets, Polymarket bots, and cryptocurrency trading tools.
  • Are newly published by accounts with no other contributions. The ClawHavoc campaign used fresh accounts to push 335 malicious skills disguised as legitimate tools.
  • Have obfuscated code or fetch remote payloads. If a SKILL.md contains base64 strings, curl commands to unfamiliar servers, or tells the agent to download and execute external scripts, it’s malware.

The ClawHub Security Problem

This isn’t theoretical risk. It’s documented, measured, and ongoing.

The Numbers

In February 2026, security firm Koi Security audited 2,857 skills on ClawHub. They found 341 malicious skills โ€” nearly 12% of everything they analyzed. The findings:

  • 335 skills deployed fake prerequisites to install Atomic Stealer (AMOS), a macOS information-stealing malware that runs $500-1,000/month on criminal marketplaces
  • Multiple skills included keyloggers that captured API keys and credentials
  • Several skills hid reverse shells within functional code โ€” the skill actually worked, but also gave an attacker remote access
  • Bot credentials were stolen from ~/.clawdbot/.env and exfiltrated via webhook.site

The campaign, dubbed “ClawHavoc,” specifically targeted OpenClaw users running Mac Minis โ€” a common setup since OpenClaw runs well as a headless service on Apple Silicon. The malicious skills masqueraded as cryptocurrency tools, YouTube utilities, and Google Workspace integrations.

This came on top of earlier research finding that 26% of 31,000 agent skills across platforms contained at least one vulnerability, including active data exfiltration via curl commands with no user notification.

Why ClawHub Moderation Is Inadequate

The current safeguards:

SafeguardWhat It DoesWhy It’s Not Enough
GitHub account age checkPublishers need a 1-week-old GitHub accountTrivial to bypass. Attackers pre-create accounts.
Community reporting3 unique reports auto-hide a skillReactive, not preventive. Damage done before reports.
Report limit20 active reports per userLimits spam but also limits vigilant users.
Download countsVisible on skill listingsEasily inflated. O’Reilly inflated a fake skill to 4,000 downloads, devs from 7 countries installed it.

There is no code review process. No automated scanning. No sandboxed testing. ClawHub’s developer notes originally stated: “All downloaded code will be treated as trusted code.” That mentality hasn’t fundamentally changed despite the reporting feature.

For the full security picture, read our OpenClaw Security Guide.


Building Your Own Skills

The safest plugin is one you wrote yourself. And it takes about 10 minutes.

Your First Custom Skill

Create a directory and a SKILL.md file:

mkdir -p ~/.openclaw/skills/my-standup

Write the skill:

---
name: my-standup
description: Generate a daily standup summary from git commits
metadata:
  openclaw:
    requires:
      bins: ["git"]
---

# Daily Standup Generator

When the user asks for a standup summary, or when triggered by
a morning cron:

1. Run `git log --oneline --since="yesterday"` in the current
   workspace
2. Group commits by type (feat, fix, chore, docs)
3. Format as a brief standup update with "Yesterday" and "Today"
   sections
4. Keep it under 200 words

That’s it. Restart OpenClaw or ask the agent to refresh skills. The agent now knows how to generate standup summaries. The skill file is the entire implementation โ€” the LLM reads the instructions and uses its existing tools (exec, in this case) to carry them out.

Skill Structure Best Practices

  • Be specific about when to activate. “When the user asks for a standup” is better than vague instructions the agent might trigger incorrectly.
  • Limit the tools referenced. If your skill only needs git, don’t write instructions that encourage the agent to also browse the web or read random files.
  • Keep instructions concise. Every skill adds tokens to the agent’s context. A 500-word SKILL.md is fine. A 5,000-word one wastes context budget. Skills cost ~24 tokens of overhead plus the instruction length.
  • Test with openclaw agent --message before connecting to live messaging channels.

Specifying Model Routing

Skills can suggest which LLM handles them. This is powerful if you’re running a multi-model setup:

---
name: code-review
description: Review code changes for bugs and style issues
metadata:
  openclaw:
    preferredModel: qwen-coder-32b
---

A coding skill routes to Qwen Coder. A planning skill routes to DeepSeek-R1. A casual chat stays on whatever your default model is. This requires each model to be available through your LLM backend โ€” typically multiple Ollama instances or a mix of local and API models.

Publishing to ClawHub

If you want to share your skill:

clawhub publish my-standup

Your skill gets a page on clawhub.ai with version history, stars, and comments. But remember โ€” you’re contributing to an ecosystem with known security problems. Version your releases, write clear documentation, and accept that someone might fork your skill and inject malicious code into their version.


Productivity (Low Risk)

Stick to bundled skills. Enable only what you use.

EnableDisable
calendar, apple-notes, apple-reminders, email-triageexec, agent-browser, docker-skill

Add a custom news summary skill if you want morning briefings. Run heartbeats during business hours only to control token costs.

Developer (Medium Risk)

You’ll need some high-risk tools. Constrain them.

EnableConfigure
github-integration, file-read, file-write, execRestrict exec to specific directories. Limit file access to project folders.

Consider a custom standup or PR review skill. If you need GitLab, install the community skill after reading its source. Run on a dedicated machine or VM โ€” not your daily-driver.

Research (Medium Risk)

Web access is useful but introduces prompt injection surface from external content.

EnableConfigure
web-search, web-fetch, pdf-extractor, news-aggregatorRestrict outbound domains. Don’t enable exec alongside web skills.

The combination of web browsing and shell access is particularly dangerous โ€” a prompt injection from a webpage could lead to command execution. Keep these skill sets separated if possible.


The Bottom Line

OpenClaw’s skill system is its greatest strength and its biggest vulnerability. The bundled skills are useful and reasonably safe. ClawHub is a minefield โ€” 12% of audited skills were actively malicious in the most recent analysis.

The practical approach:

  1. Start with bundled skills only. They cover email, calendar, GitHub, browser, files, and shell.
  2. Disable what you don’t need. Every enabled skill is attack surface.
  3. Read the source before installing any community skill. If you can’t understand what a SKILL.md does, don’t install it.
  4. Build your own for custom needs. It takes 10 minutes and you control every instruction.
  5. Run on dedicated hardware with throwaway accounts until you trust your setup. See our security guide for hardening steps.

The best OpenClaw setup isn’t the one with the most plugins. It’s the one with the fewest plugins that still does what you need.