How to Verify File Hashes for Malware with OpenClaw

Verify File Hashes for Malware with OpenClaw and ToolRouter. Check file hashes against threat intelligence databases to determine if a file is known malware before executing it.

Tool
Security Scanner icon
Security Scanner

OpenClaw lets you run hash checks across a bulk list of files — scanning an entire software repository, asset library, or vendor delivery in a single job. This is the right approach for recurring asset integrity audits or batch validation of files before a major deployment.

Connect ToolRouter to OpenClaw

1Install the CLI
npm install -g toolrouter-mcp
2Call tools directly from OpenClaw
toolrouter-mcp call web-search search --query "AI tools"
toolrouter-mcp tools

Steps

Once connected (see setup above), use the Security Scanner tool:

  1. Generate hashes for all files in the batch using your OS hashing tools.
  2. Run `security-scanner` with `check_hash` for each hash and collect results in a normalized schema.
  3. Filter to flagged hashes and sort by detection count to prioritize the highest-confidence threats.
  4. Export the results for the security team or use them as a gate before deploying the asset set.

Example Prompt

Try this with OpenClaw using the Security Scanner tool
Use security-scanner to check these SHA256 hashes in batch: 3395856ce81f2b7382dee72602f798b642f14140d912dc31f34e09bb5938b2f5, abc123def456..., xyz789.... Return each with hash, verdict, detection_count, and malware_family in a stable schema. Flag anything with detection_count above 5 as high priority.

Tips

  • Generate all hashes in one pass before starting the batch check so the input list is stable.
  • Set a detection_count threshold (e.g., 5 engines) to separate high-confidence threats from borderline false positives.
  • Keep the schema fixed between runs so results from different asset batches can be compared.