hackmyagent 0.3.9 → 0.4.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/README.md +45 -11
  2. package/package.json +2 -2
package/README.md CHANGED
@@ -7,13 +7,24 @@
7
7
 
8
8
  **Website:** [hackmyagent.com](https://hackmyagent.com) — Scan external infrastructure for exposed MCP endpoints, configs, and credentials
9
9
 
10
+ ## What's New — v0.4.0
11
+
12
+ **First scanner for [CVE-2026-25253](https://hackmyagent.com/blog/cve-2026-25253-detection)** (CVSS 8.8) — the OpenClaw WebSocket hijacking RCE.
13
+
14
+ - **CVE-001:** Detect vulnerable OpenClaw versions (before v2026.1.29)
15
+ - **CVE-002:** Missing `controlUi.allowedOrigins` (patch alone isn't enough)
16
+ - **SUPPLY-005–008:** ClawHavoc campaign IOCs (C2 IPs, malware filenames, ClickFix patterns)
17
+ - **GATEWAY-007–008, CONFIG-007–009:** Config hardening (open DM wildcards, disabled sandbox, weak tokens)
18
+
19
+ 11 new checks. 145+ total.
20
+
10
21
  ## Disclaimer
11
22
 
12
23
  HackMyAgent performs passive reconnaissance only (port checks and HTTP requests) — it does not exploit vulnerabilities. However, please only scan systems you own or have permission to test. The authors assume no liability for misuse of this tool.
13
24
 
14
25
  ```bash
15
26
  npx hackmyagent check @publisher/skill # verify a skill before installing
16
- npx hackmyagent secure # harden your agent setup (100 checks)
27
+ npx hackmyagent secure # harden your agent setup (145+ checks)
17
28
  npx hackmyagent secure --fix # auto-fix security issues
18
29
  npx hackmyagent scan example.com # scan for exposed infrastructure
19
30
  npx hackmyagent attack --local # red team with 55 attack payloads
@@ -29,10 +40,10 @@ npx hackmyagent secure --benchmark oasb-1 # run OASB-1 security benchmark
29
40
 
30
41
  ## Why HackMyAgent?
31
42
 
32
- AI agents are powerful but introduce new attack surfaces. Skills can be malicious. Configs can leak secrets. MCP servers can be exposed. HackMyAgent helps you:
43
+ CVE-2026-25253 turned every OpenClaw installation into a remote code execution target. 341 malicious skills were distributed through ClawHub. AI agent security is no longer theoretical — HackMyAgent helps you:
33
44
 
34
45
  - **Check** skills before installing (publisher verification, permission analysis)
35
- - **Secure** your agent setup (100-point CIS security scan, auto-remediation)
46
+ - **Secure** your agent setup (145+ security checks with auto-remediation)
36
47
  - **Scan** external infrastructure (exposed MCP endpoints, leaked configs)
37
48
 
38
49
  ## Installation
@@ -52,7 +63,7 @@ npm install --save-dev hackmyagent
52
63
 
53
64
  ### `hackmyagent secure`
54
65
 
55
- Scan and harden your local agent setup with 100 security checks across 24 categories.
66
+ Scan and harden your local agent setup with 145+ security checks across 31 categories.
56
67
 
57
68
  ```bash
58
69
  # Basic scan
@@ -92,7 +103,26 @@ hackmyagent secure --verbose
92
103
  | AUDIT | 4 | Audit trails |
93
104
  | SANDBOX | 4 | Process isolation |
94
105
  | TOOL | 4 | Tool permission boundaries |
95
- | And 13 more... | 42 | Auth, deps, env, git, io, log, perm, proc, rate, sec, api, vscode, cursor |
106
+ | AUTH | 4 | Authentication checks |
107
+ | DEPS | 4 | Dependency security |
108
+ | ENV | 4 | Environment variable safety |
109
+ | GIT | 4 | Git security (.gitignore, secrets in history) |
110
+ | IO | 4 | Input/output validation |
111
+ | LOG | 4 | Logging and monitoring |
112
+ | PERM | 4 | File permissions |
113
+ | PROC | 4 | Process isolation |
114
+ | RATE | 4 | Rate limiting |
115
+ | SEC | 4 | General security headers |
116
+ | API | 4 | API security |
117
+ | VSCODE | 4 | VS Code configuration |
118
+ | CURSOR | 4 | Cursor IDE configuration |
119
+ | CVE | 2 | CVE-2026-25253 detection |
120
+ | GATEWAY | 8 | Gateway misconfigurations |
121
+ | CONFIG | 9 | Insecure settings |
122
+ | SUPPLY | 8 | Supply chain attacks |
123
+ | SKILL | 12 | Malicious skill detection |
124
+ | HEARTBEAT | 6 | Heartbeat/cron abuse |
125
+ | WINDSURF | 3 | Windsurf IDE configuration |
96
126
 
97
127
  **Exit Codes:**
98
128
  - `0` - No critical/high issues
@@ -299,7 +329,7 @@ hackmyagent secure -b oasb-1 --fail-below 70
299
329
 
300
330
  ### `hackmyagent secure-openclaw`
301
331
 
302
- Scan OpenClaw/Moltbot installations with 34 specialized security checks and auto-remediation.
332
+ Scan OpenClaw/Moltbot installations with 45 specialized security checks and auto-remediation.
303
333
 
304
334
  ```bash
305
335
  hackmyagent secure-openclaw # scan default location
@@ -310,8 +340,11 @@ hackmyagent secure-openclaw --json # JSON output for CI/CD
310
340
  ```
311
341
 
312
342
  **Detects:**
343
+ - CVE-2026-25253 vulnerable versions (before v2026.1.29)
344
+ - Missing `controlUi.allowedOrigins` (patch alone isn't enough)
345
+ - ClawHavoc C2 IP addresses and malware filenames
346
+ - ClickFix social engineering patterns
313
347
  - Unsigned/malicious skills (ClawHavoc campaign patterns)
314
- - ClickFix social engineering attacks
315
348
  - Reverse shell backdoors
316
349
  - Credential exfiltration (wallets, SSH keys, API keys)
317
350
  - Heartbeat/cron abuse
@@ -331,9 +364,10 @@ hackmyagent secure-openclaw --json # JSON output for CI/CD
331
364
  |----------|--------|-------------|
332
365
  | SKILL | 12 | Malicious skill detection |
333
366
  | HEARTBEAT | 6 | Heartbeat/cron abuse |
334
- | GATEWAY | 6 | Gateway misconfigurations (4 auto-fixable) |
335
- | CONFIG | 6 | Insecure settings |
336
- | SUPPLY | 4 | Supply chain attacks |
367
+ | GATEWAY | 8 | Gateway misconfigurations (4 auto-fixable) |
368
+ | CONFIG | 9 | Insecure settings |
369
+ | SUPPLY | 8 | Supply chain attacks |
370
+ | CVE | 2 | CVE-2026-25253 detection |
337
371
 
338
372
  See [SECURITY_CHECKS.md](docs/SECURITY_CHECKS.md#openclaw-security-checks) for full documentation.
339
373
 
@@ -428,7 +462,7 @@ hackmyagent secure --json | jq '.findings[] | select(.severity == "critical")'
428
462
 
429
463
  ## Security Check Reference
430
464
 
431
- For the complete list of 100 security checks with descriptions and remediation guidance, see [SECURITY_CHECKS.md](docs/SECURITY_CHECKS.md).
465
+ For the complete list of 145+ security checks with descriptions and remediation guidance, see [SECURITY_CHECKS.md](docs/SECURITY_CHECKS.md).
432
466
 
433
467
  ## Auto-Fix Capabilities
434
468
 
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "hackmyagent",
3
- "version": "0.3.9",
3
+ "version": "0.4.1",
4
4
  "description": "Security toolkit for AI agents - verify skills, harden setups, scan for exposures",
5
5
  "bin": {
6
6
  "hackmyagent": "dist/index.js"
@@ -18,7 +18,7 @@
18
18
  },
19
19
  "dependencies": {
20
20
  "commander": "^12.0.0",
21
- "hackmyagent-core": "^0.3.9"
21
+ "hackmyagent-core": "^0.4.0"
22
22
  },
23
23
  "devDependencies": {
24
24
  "typescript": "^5.3.3"