Physical-layer hex auditing skill for AI agents. Detects hidden binary data, control characters, and encoding-based attacks.
- Hex Dump Analysis - View file contents in hexadecimal
- Hidden Data Detection - Scan for embedded payloads, magic bytes, steganography
- Encoding Analysis - Detect non-printable chars, null bytes, weird encodings
- Self-Integrity - Built-in tamper detection
- Node.js 18+
- npm or pnpm
-
Clone the repository:
git clone https://github.com/Matrix-Meta/hex-vetter.git cd hex-vetter -
Install dependencies:
npm install # or pnpm install -
Verify installation:
node -e "const { scanFile } = require('./vet.js'); console.log('OK');"
If using with OpenClaw, the skill is typically installed via:
clawhub install hex-vetter
# or copy to skills directoryconst { scanFile } = require('./vet.js');
const result = await scanFile('/path/to/file.bin');hex-vetter/
├── starfragment.js # Core module
├── scan_all.js # Recursive directory scanner
├── verify.js # Integrity verification
├── vet.js # Main entry
├── .gitignore
├── LICENSE # GPLv3
├── README.md
└── SKILL.md # Skill documentation
The module uses self-modifying storage - reading and writing data from/to its own file at runtime. Constants are encoded and stored as valid JavaScript comments at the end of the source file.
GNU General Public License v3 (GPLv3)