Jump to related tools in the same category or review the original source on GitHub.

Productivity & Tasks @chipp11 Updated 2/22/2026

Angus Bounty Hunter OpenClaw Plugin & Skill | ClawHub

Looking to integrate Angus Bounty Hunter into your AI workflows? This free OpenClaw plugin from ClawHub helps you automate productivity & tasks tasks instantly, without having to write custom tools from scratch.

What this skill does

Automated smart contract bug bounty hunting. Scans Immunefi/Code4rena targets with Slither static analysis, triages findings with local LLMs, and generates PoC templates. Zero API cost for scanning phase.

Install

npx clawhub@latest install angus-bounty-hunter

Full SKILL.md

Open original
Metadata table.
nameversiondescription
bounty-hunter1.0.0Automated smart contract bug bounty hunting. Scans Immunefi/Code4rena targets with Slither static analysis, triages findings with local LLMs, and generates PoC templates. Zero API cost for scanning phase.

SKILL.md content below is scrollable.

Bounty Hunter

Automated smart contract vulnerability scanner for bug bounty programs. Uses free tools (Slither + local LLMs) for the heavy lifting, saves expensive models for PoC writing.

Requirements

  • slither-analyzer (pip): Static analysis
  • solc-select (pip): Solidity compiler management
  • Node.js: For script execution
  • Optional: Ollama with any code model for local triage

Quick Start

# Scan a repo
bash scripts/scan.sh <github-repo-url> [src-dir]

# Triage findings (uses local LLM if available, otherwise prints raw)
bash scripts/triage.sh <scan-output.json>

# Generate PoC template for a finding
bash scripts/poc-template.sh <finding-id> <contract-address>

Workflow

  1. Target Selection — Check Immunefi/Code4rena for active programs
  2. Clone & Scanscan.sh clones the repo, installs solc, runs Slither
  3. Triagetriage.sh filters HIGH/MEDIUM findings, removes known false positives
  4. Deep Dive — Only read code that Slither flagged (save your tokens)
  5. PoC — Use poc-template.sh to generate Foundry test scaffolding
  6. Submit — Write up finding on Immunefi/Code4rena

Target Selection Criteria

Before scanning, check:

  • Scope last updated within 30 days (fresh code = more bugs)
  • Past payouts > $50K (they actually pay)
  • GitHub repo in scope (not just deployed addresses)
  • Solidity-based (Slither only works with Solidity)

Anti-Patterns

  • Don't read entire codebases manually — let Slither scan first
  • Don't spend > 1 hour on a target without a concrete lead
  • Don't submit known issues (check past reports first)
  • Don't ignore test coverage — untested code is where bugs hide
Original Repository URL: https://github.com/openclaw/skills/blob/main/skills/chipp11/angus-bounty-hunter
Latest commit: https://github.com/openclaw/skills/commit/d49cf4b22d10065ed32595ac8f27bf0b45597367

Related skills

If this matches your use case, these are close alternatives in the same category.