hackmyagent 0.3.9 → 0.4.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +45 -11
- package/package.json +2 -2
package/README.md
CHANGED
|
@@ -7,13 +7,24 @@
|
|
|
7
7
|
|
|
8
8
|
**Website:** [hackmyagent.com](https://hackmyagent.com) — Scan external infrastructure for exposed MCP endpoints, configs, and credentials
|
|
9
9
|
|
|
10
|
+
## What's New — v0.4.0
|
|
11
|
+
|
|
12
|
+
**First scanner for [CVE-2026-25253](https://hackmyagent.com/blog/cve-2026-25253-detection)** (CVSS 8.8) — the OpenClaw WebSocket hijacking RCE.
|
|
13
|
+
|
|
14
|
+
- **CVE-001:** Detect vulnerable OpenClaw versions (before v2026.1.29)
|
|
15
|
+
- **CVE-002:** Missing `controlUi.allowedOrigins` (patch alone isn't enough)
|
|
16
|
+
- **SUPPLY-005–008:** ClawHavoc campaign IOCs (C2 IPs, malware filenames, ClickFix patterns)
|
|
17
|
+
- **GATEWAY-007–008, CONFIG-007–009:** Config hardening (open DM wildcards, disabled sandbox, weak tokens)
|
|
18
|
+
|
|
19
|
+
11 new checks. 145+ total.
|
|
20
|
+
|
|
10
21
|
## Disclaimer
|
|
11
22
|
|
|
12
23
|
HackMyAgent performs passive reconnaissance only (port checks and HTTP requests) — it does not exploit vulnerabilities. However, please only scan systems you own or have permission to test. The authors assume no liability for misuse of this tool.
|
|
13
24
|
|
|
14
25
|
```bash
|
|
15
26
|
npx hackmyagent check @publisher/skill # verify a skill before installing
|
|
16
|
-
npx hackmyagent secure # harden your agent setup (
|
|
27
|
+
npx hackmyagent secure # harden your agent setup (145+ checks)
|
|
17
28
|
npx hackmyagent secure --fix # auto-fix security issues
|
|
18
29
|
npx hackmyagent scan example.com # scan for exposed infrastructure
|
|
19
30
|
npx hackmyagent attack --local # red team with 55 attack payloads
|
|
@@ -29,10 +40,10 @@ npx hackmyagent secure --benchmark oasb-1 # run OASB-1 security benchmark
|
|
|
29
40
|
|
|
30
41
|
## Why HackMyAgent?
|
|
31
42
|
|
|
32
|
-
|
|
43
|
+
CVE-2026-25253 turned every OpenClaw installation into a remote code execution target. 341 malicious skills were distributed through ClawHub. AI agent security is no longer theoretical — HackMyAgent helps you:
|
|
33
44
|
|
|
34
45
|
- **Check** skills before installing (publisher verification, permission analysis)
|
|
35
|
-
- **Secure** your agent setup (
|
|
46
|
+
- **Secure** your agent setup (145+ security checks with auto-remediation)
|
|
36
47
|
- **Scan** external infrastructure (exposed MCP endpoints, leaked configs)
|
|
37
48
|
|
|
38
49
|
## Installation
|
|
@@ -52,7 +63,7 @@ npm install --save-dev hackmyagent
|
|
|
52
63
|
|
|
53
64
|
### `hackmyagent secure`
|
|
54
65
|
|
|
55
|
-
Scan and harden your local agent setup with
|
|
66
|
+
Scan and harden your local agent setup with 145+ security checks across 31 categories.
|
|
56
67
|
|
|
57
68
|
```bash
|
|
58
69
|
# Basic scan
|
|
@@ -92,7 +103,26 @@ hackmyagent secure --verbose
|
|
|
92
103
|
| AUDIT | 4 | Audit trails |
|
|
93
104
|
| SANDBOX | 4 | Process isolation |
|
|
94
105
|
| TOOL | 4 | Tool permission boundaries |
|
|
95
|
-
|
|
|
106
|
+
| AUTH | 4 | Authentication checks |
|
|
107
|
+
| DEPS | 4 | Dependency security |
|
|
108
|
+
| ENV | 4 | Environment variable safety |
|
|
109
|
+
| GIT | 4 | Git security (.gitignore, secrets in history) |
|
|
110
|
+
| IO | 4 | Input/output validation |
|
|
111
|
+
| LOG | 4 | Logging and monitoring |
|
|
112
|
+
| PERM | 4 | File permissions |
|
|
113
|
+
| PROC | 4 | Process isolation |
|
|
114
|
+
| RATE | 4 | Rate limiting |
|
|
115
|
+
| SEC | 4 | General security headers |
|
|
116
|
+
| API | 4 | API security |
|
|
117
|
+
| VSCODE | 4 | VS Code configuration |
|
|
118
|
+
| CURSOR | 4 | Cursor IDE configuration |
|
|
119
|
+
| CVE | 2 | CVE-2026-25253 detection |
|
|
120
|
+
| GATEWAY | 8 | Gateway misconfigurations |
|
|
121
|
+
| CONFIG | 9 | Insecure settings |
|
|
122
|
+
| SUPPLY | 8 | Supply chain attacks |
|
|
123
|
+
| SKILL | 12 | Malicious skill detection |
|
|
124
|
+
| HEARTBEAT | 6 | Heartbeat/cron abuse |
|
|
125
|
+
| WINDSURF | 3 | Windsurf IDE configuration |
|
|
96
126
|
|
|
97
127
|
**Exit Codes:**
|
|
98
128
|
- `0` - No critical/high issues
|
|
@@ -299,7 +329,7 @@ hackmyagent secure -b oasb-1 --fail-below 70
|
|
|
299
329
|
|
|
300
330
|
### `hackmyagent secure-openclaw`
|
|
301
331
|
|
|
302
|
-
Scan OpenClaw/Moltbot installations with
|
|
332
|
+
Scan OpenClaw/Moltbot installations with 45 specialized security checks and auto-remediation.
|
|
303
333
|
|
|
304
334
|
```bash
|
|
305
335
|
hackmyagent secure-openclaw # scan default location
|
|
@@ -310,8 +340,11 @@ hackmyagent secure-openclaw --json # JSON output for CI/CD
|
|
|
310
340
|
```
|
|
311
341
|
|
|
312
342
|
**Detects:**
|
|
343
|
+
- CVE-2026-25253 vulnerable versions (before v2026.1.29)
|
|
344
|
+
- Missing `controlUi.allowedOrigins` (patch alone isn't enough)
|
|
345
|
+
- ClawHavoc C2 IP addresses and malware filenames
|
|
346
|
+
- ClickFix social engineering patterns
|
|
313
347
|
- Unsigned/malicious skills (ClawHavoc campaign patterns)
|
|
314
|
-
- ClickFix social engineering attacks
|
|
315
348
|
- Reverse shell backdoors
|
|
316
349
|
- Credential exfiltration (wallets, SSH keys, API keys)
|
|
317
350
|
- Heartbeat/cron abuse
|
|
@@ -331,9 +364,10 @@ hackmyagent secure-openclaw --json # JSON output for CI/CD
|
|
|
331
364
|
|----------|--------|-------------|
|
|
332
365
|
| SKILL | 12 | Malicious skill detection |
|
|
333
366
|
| HEARTBEAT | 6 | Heartbeat/cron abuse |
|
|
334
|
-
| GATEWAY |
|
|
335
|
-
| CONFIG |
|
|
336
|
-
| SUPPLY |
|
|
367
|
+
| GATEWAY | 8 | Gateway misconfigurations (4 auto-fixable) |
|
|
368
|
+
| CONFIG | 9 | Insecure settings |
|
|
369
|
+
| SUPPLY | 8 | Supply chain attacks |
|
|
370
|
+
| CVE | 2 | CVE-2026-25253 detection |
|
|
337
371
|
|
|
338
372
|
See [SECURITY_CHECKS.md](docs/SECURITY_CHECKS.md#openclaw-security-checks) for full documentation.
|
|
339
373
|
|
|
@@ -428,7 +462,7 @@ hackmyagent secure --json | jq '.findings[] | select(.severity == "critical")'
|
|
|
428
462
|
|
|
429
463
|
## Security Check Reference
|
|
430
464
|
|
|
431
|
-
For the complete list of
|
|
465
|
+
For the complete list of 145+ security checks with descriptions and remediation guidance, see [SECURITY_CHECKS.md](docs/SECURITY_CHECKS.md).
|
|
432
466
|
|
|
433
467
|
## Auto-Fix Capabilities
|
|
434
468
|
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "hackmyagent",
|
|
3
|
-
"version": "0.
|
|
3
|
+
"version": "0.4.1",
|
|
4
4
|
"description": "Security toolkit for AI agents - verify skills, harden setups, scan for exposures",
|
|
5
5
|
"bin": {
|
|
6
6
|
"hackmyagent": "dist/index.js"
|
|
@@ -18,7 +18,7 @@
|
|
|
18
18
|
},
|
|
19
19
|
"dependencies": {
|
|
20
20
|
"commander": "^12.0.0",
|
|
21
|
-
"hackmyagent-core": "^0.
|
|
21
|
+
"hackmyagent-core": "^0.4.0"
|
|
22
22
|
},
|
|
23
23
|
"devDependencies": {
|
|
24
24
|
"typescript": "^5.3.3"
|