Supply Chain Verified

Every integration, manually verified

We could add hundreds of integrations. Instead, we add only the ones we can fully audit and pin. Fewer integrations, zero supply chain surprises.

Why we started doing this: ClawHavoc (February 2026)

In February 2026, a coordinated supply chain campaign called ClawHavoc planted 335 confirmed malicious skills across the ClawHub registry, accumulating 12,559+ downloads before detection. Affected skills used three attack techniques: prompt injection in SKILL.md files, reverse shell scripts, and CVE-2026-25253 token exfiltration — silently stealing API keys stored in agent memory. Independent analysis by Snyk found that 13.4% of all ClawHub skills had critical security flaws.

Our response was to audit every skill we shipped, pin all of them to known-good versions, and build a verification process so every future addition goes through the same scrutiny before reaching a customer instance.

Our verification process

Every integration goes through three gates before it ships to any customer instance. There are no exceptions.

Step 1

Official-source only

We only add integrations that ship an official OpenClaw CLI or a verified entry in the ClawHub registry. Community forks and unofficial wrappers are excluded regardless of quality.

Step 2

Version-pin everything

Every package, skill, and GitHub archive is locked to an exact version or full 40-character commit SHA. Nothing is ever installed with @latest or from a floating branch.

Step 3

Audit before each bump

When we update a pinned version, we re-audit the changelog and diff for supply chain risk before shipping the new pin to customer instances.

Three ways we pin versions

Different integrations ship in different ways. We use the strongest available anchor for each one.

npm semver pin

firecrawl-cli@"1.9.3"

npm CLI integrations (like Firecrawl) are pinned to an exact semver version. Installs are idempotent: a versioned marker file prevents reinstall on every boot, but forces a fresh install on version bump.

Git commit SHA pin

brave/brave-search-skills @ 2827ed3c

Repos that don't publish versioned releases (like Brave Search skills) are pinned to a full 40-character commit SHA. The hash is cryptographically tied to an exact tree state — not a moving target.

ClawHub versioned install

clawhub install linear --version "1.0.0"

Skills from the ClawHub registry are installed with an explicit --version flag via a pinned clawhub CLI version. Double-pinned: the registry client and the skill itself.

Idempotent installs: Every install is guarded by a versioned marker file on the machine's persistent volume. The install only runs once per version. When we bump a pin, the marker changes, and the new version installs automatically on next boot — no manual intervention needed on any instance.

Currently verified integrations

These are the integrations that have passed our verification process. Each one is pinned, audited, and monitored for upstream changes.

IntegrationPin method
Firecrawl
Web scraping, search, and remote browser automation
npm semver
Brave Search
10 privacy-focused search skills, no IP tracking
commit SHA
GitHub
Manage repos, issues, and PRs from your agent
ClawHub versioned
AgentMail
Dedicated email inbox for your AI agent
ClawHub versioned
Linear
Project and issue management
ClawHub versioned
Decodo Scraper
Structured data extraction from any website
ClawHub versioned

What we don't add

The integrations we haven't added are often a deliberate choice, not an oversight. Here's what fails our verification gate.

Community forks without provenance

A skill published by an unknown author claiming to wrap an official API. No way to audit what runs on your machine.

No versioned releases

Unless we can pin to a full commit SHA, floating branches are a supply chain attack waiting to happen.

Interactive-only install commands

CLIs that open a browser or require manual input during install can't run in a non-interactive startup script safely.

Excessive permissions

Skills that request broad filesystem or network access beyond what the integration actually needs.

An AI instance you can actually trust

Every integration that runs on your instance has been manually audited, version-pinned, and verified by our team. You don't have to think about supply chain risk — we already did.

Get Your Secure Instance