Disclaimer: This code is generated and experimental, and is not necessarily intended to be extended upon.
A TUI to discover potentially malicious skills in ClawHub by scraping SKILL.md/SOUL.md and scanning them with YARA rules.
# Launch the TUI (default targets: clawhub.ai, onlycrabs.ai)
go run .
# Launch with custom targets / output / rules
go run . -targets "https://example.com,https://another.com" -out outdir -rules rules
# Launch with debug logging
go run . -log-level debug# Scan a single remote SKILL.md or SOUL.md (downloads to out/single/<host>/)
go run . -scan-url "https://clawhub.ai/skills/example/SKILL.md"
# Scan a local SKILL.md
go run . -scan-file "/path/to/SKILL.md"You’ll spend most of your time in the tabs across the top:
- Target: targets or single URL, output dir, rules dir, matches file path
- Downloads: download progress + current item
- YARA: rule mode (all vs selected) + scan progress
- Matches: per-file matches with line/column
- Logs: recent activity and warnings
←/→orh/lswitch tabstabnext fielde/enteredit fieldj/kmove in listsg/Gjump to top/bottomddownloadyscanwwrite matches to filertoggle all/selected rulesstoggle scan mode (batch vs single URL)spacetoggle rule selection (when in selected mode)qquit
- Target → confirm targets/output/rules.
- Downloads → press
d(download + scan). - YARA → press
yto re-scan existing files. - Matches → review hits, then press
wto save them.
- Target → set Single URL.
- Press
sto switch to single URL mode. - Press
yto download + scan in one step.
- Downloads are cached: already-downloaded files are reused.
ywill scan existing downloaded files even after a restart.- Matches include
line:columnfor each YARA string hit.
- Go 1.22+
- libyara installed (go-yara uses CGO; required for scanning)