Skip to main content

Automated Scanner

Sigil Bot

Sigil Bot continuously monitors package registries for security threats targeting the AI development ecosystem. Scan results are published automatically at sigilsec.ai/scans.

sigil-bot — monitoring
PyPI
npm
ClawHub
GitHub
Waiting for registry events...

How Sigil Bot Works

Sigil Bot monitors four package registries for newly published and updated packages:

PyPI

Python packages via RSS feeds and changelog API

npm

JavaScript packages via CouchDB changes feed

ClawHub

AI agent skills via REST API

GitHub

MCP server repositories via Search and Events API

When a new package or update is detected, the bot downloads the source code, runs a static analysis scan across six security phases, and publishes the results to the public scan database.

No code is executed during scanning. Sigil performs static analysis only — pattern matching against known threat indicators. Packages are never installed or run.

Scanning Schedule

RegistryPoll Frequency
PyPIEvery 60 seconds
npmEvery 60 seconds
ClawHubEvery 6 hours
GitHubEvery 30 minutes

Frequencies may be adjusted based on registry rate limits and operational needs.

Detection Methodology

Sigil scans eight security phases with weighted severity scoring. Each finding has a severity weight. The total weighted score determines the overall verdict.

01

Install Hooks

Critical

setup.py cmdclass, npm postinstall scripts, Makefile targets

02

Code Patterns

High

eval, exec, pickle, child_process, dynamic code execution

03

Network / Exfiltration

High

Outbound HTTP calls, webhooks, DNS tunnelling, socket connections

04

Credential Access

Medium

Environment variable reads, API key patterns, SSH key access

05

Obfuscation

High

Base64 encoding, character code arrays, hex-encoded payloads

06

Provenance

Low–Medium

Git history anomalies, binary files, hidden directories, name similarity to popular packages

Full methodology details available on the Methodology page.

Which Packages Are Scanned

ClawHub

All skills are scanned. The entire registry is in scope because every skill has direct access to the user's environment.

PyPI & npm

Packages are filtered by AI ecosystem relevance — matching against keywords like langchain, openai, anthropic, mcp, agent, llm, rag, transformers, and more. Scoped npm packages under @modelcontextprotocol, @langchain, @anthropic, @openai are always scanned.

GitHub

Repositories matching MCP server patterns (topic tags, config files, import patterns) with at least one star or more than one commit.

Packages with names closely resembling popular AI packages (potential typosquatting) are automatically prioritised for immediate scanning.

About Sigil Bot

Sigil Bot operates under the sigil-bot identity:

Scan databaseResults are attributed to "Scanned by Sigil Bot" with timestamps
GitHub AppPR comments appear from sigil-bot[bot]
Threat feedAutomated alerts posted to RSS and API endpoints

All output is automated. Scan results are systematic, algorithmic assessments — not editorial judgments by individuals. Results indicate the presence of patterns associated with known threat categories, not definitive classifications of malicious intent.

Dispute a Scan Result

If you believe a scan result is inaccurate or your package has been incorrectly flagged:

01

Review the report

Check the full scan report to understand which findings were detected and why.

02

Submit a dispute

Email disputes@sigilsec.ai with the package name, ecosystem, version, and which findings you believe are incorrect.

03

Provide context

Explain the legitimate purpose of the flagged pattern. This helps us refine detection rules.

04

Resolution

We review within 5 business days. False positives are suppressed, broad rules are refined, accurate findings remain with an explanation.

Disputes do not remove scan results from the database. Resolved disputes add a “Reviewed” annotation to the report page. Contact disputes@sigilsec.ai.

FAQ

Does Sigil Bot scan every package on npm and PyPI?
No. Sigil Bot filters for AI-related packages using keyword matching against package names, descriptions, and classifiers. All ClawHub skills and GitHub MCP server repositories are scanned without filtering.
How often are packages rescanned?
New versions are scanned immediately when detected. Packages with HIGH RISK or CRITICAL RISK verdicts are rescanned weekly. Popular packages with over 10,000 weekly downloads are rescanned monthly.
Can I request a scan of a specific package?
Not yet — this feature is on the roadmap. Currently, Sigil Bot discovers and scans packages automatically through registry monitoring feeds.
How do I dispute a scan result?
Email disputes@sigilsec.ai with the package name, ecosystem, version, and which specific findings you are contesting. Sigil acknowledges disputes within 48 hours and resolves most within 5 business days.
SigilSIGIL by NOMARK
A protective mark for every line of code.