openclaw-security

⚠️ HIGH PRIVILEGE SECURITY AUDIT SKILL Performs comprehensive security auditing for OpenClaw deployments. Requires system-level access for legitimate security scanning purposes. All operations are read-only and local-only. Covers: environment isolation, privilege checks, port exposure, skill trust sources, version checks, process monitoring, sensitive directory changes, cron jobs, SSH audits, file integrity baselines, yellow-line operation audits, disk usage, environment variable leak detection, DLP scanning (private key/mnemonic detection), skill/MCP integrity tracking, and disaster recovery backups. Use when: security audits, firewall/SSH/update hardening, risk posture review, exposure assessment, or periodic security checks on machines running OpenClaw (laptop, workstation, Pi, VPS).

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "openclaw-security" with this command: npx skills add iaadoa/security-audit-openclaw

OpenClaw Security Audit

Comprehensive security auditing for OpenClaw deployments. This skill performs automated security checks and generates reports.

⚠️ Security Notice: This skill requires elevated system access for legitimate security auditing purposes. See SECURITY.md for detailed security declarations and data handling policies.

Quick Start

Run the security audit script:

python3 scripts/openclaw_security_audit.py

This generates:

  • Brief summary printed to stdout
  • Detailed report saved to /tmp/openclaw-security-reports/report-{DATE}.txt

What It Checks

CheckDescription
Environment IsolationDetects Docker/container/VM environments
Privilege CheckVerifies OpenClaw isn't running as root
Port ExposureChecks if Gateway port 18789 is exposed
Skill TrustLists installed skills and their sources
Version CheckCompares current vs latest OpenClaw version
Process & NetworkCaptures listening ports and top processes
Sensitive DirectoriesCounts file changes in /etc, ~/.ssh, etc.
System CronLists system timers and cron jobs
OpenClaw CronRetrieves internal OpenClaw scheduled tasks
SSH AuditRecent logins and failed SSH attempts
File IntegritySHA256 hash and permission checks
Yellow Line AuditCompares sudo logs with memory records
Disk UsageRoot partition usage and large files
Environment VariablesScans Gateway process for sensitive vars
DLP ScanDetects plaintext private keys/mnemonics (read-only)
Skill/MCP IntegrityTracks file hash changes over time
Disaster RecoveryAuto-commits OpenClaw state to Git (opt-in)

Security & Privacy

Data Handling

  • All scans are local-only - No data leaves your machine
  • Read-only operations - No system modifications (except opt-in features)
  • Opt-in external features - Git backup and Telegram notifications are disabled by default

Sensitive Operations

See SECURITY.md for detailed explanations of:

  • DLP scanning (private key/mnemonic detection)
  • Environment variable auditing
  • Git disaster recovery

Required Permissions

This skill requires system access for:

  • Running system commands (ss, top, systemctl, etc.)
  • Reading OpenClaw configuration files
  • Inspecting Gateway process environment
  • Scanning workspace files for credential leaks

Output Format

Brief Format (stdout)

OpenClaw Daily Security Brief (2026-03-11)

[OK] Environment Isolation: Running in isolated environment
[OK] Privilege Check: Complies with least privilege principle
[WARNING] Port Exposure: Port 18789 listening on all interfaces, recommend binding to 127.0.0.1
...

Warning Items:
[WARNING] Port Exposure: Port 18789 listening on all interfaces, recommend binding to 127.0.0.1

Detailed Report

Full report saved to /tmp/openclaw-security-reports/report-{DATE}.txt

Configuration

Optional Features (Disabled by Default)

To enable external operations, set the following environment variables:

Git Disaster Recovery

export SECURITY_AUDIT_ENABLE_GIT=1

Enables automatic Git commit and push of OpenClaw state to your configured remote.

Telegram Notifications

export SECURITY_AUDIT_ENABLE_TELEGRAM=1
export TELEGRAM_BOT_TOKEN="your-bot-token"
export TELEGRAM_CHAT_ID="your-chat-id"

Sends audit summary to Telegram after each run.

Scheduling

To run daily via OpenClaw cron:

openclaw cron add --name "daily-security-audit" --schedule "0 9 * * *" --command "python3 ~/.openclaw/workspace/skills/openclaw-security/scripts/openclaw_security_audit.py"

Version History

VersionDateChanges
1.0.22026-03-16Made Git backup and Telegram opt-in features (disabled by default)
1.0.12026-03-16Added SECURITY.md, enhanced documentation
1.0.02026-03-13Initial release

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Git Secrets Scanner

Git 安全扫描器 - 检查提交中的敏感信息泄露(API keys、密码、token)

Registry SourceRecently Updated
Security

Skeall Skill Builder

Agent Skills (SKILL.md) builder, auditor, and improver for cross-platform LLM agents. Use for "skeall", "build a skill", "create skill", "improve skill", "au...

Registry SourceRecently Updated
Security

Skill Trust Guard

Enforces skill-trust-scanner security checks before installing skills, blocking or alerting based on risk scores to reduce supply chain threats.

Registry SourceRecently Updated
Security

Funky Fund Flamingo

Repair-first self-evolution for OpenClaw — audit logs, memory, and skills; run measurable mutation cycles. Get paid. Evolve. Repeat. Dolla dolla bill y'all.

Registry SourceRecently Updated
8970Profile unavailable