clawpinch

Security audit toolkit for OpenClaw deployments. Scans 63 checks across 8 categories. Use when asked to audit security, harden an installation, check for vulnerabilities, or review config safety.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "clawpinch" with this command: npx skills add https://github.com/MikeeBuilds/clawpinch

When to Use

  • User asks to "audit security", "check for vulnerabilities", or "harden" an OpenClaw deployment
  • After installing or updating OpenClaw or any skill
  • Before deploying to production
  • During security reviews or incident response
  • When investigating suspicious skill behavior

Installation

Method 1: npx (no install)

npx clawpinch

Method 2: Global install

npm install -g clawpinch
clawpinch

Method 3: From source

git clone https://github.com/MikeeBuilds/clawpinch.git
cd clawpinch
bash clawpinch.sh

CLI Commands

# Standard interactive scan
clawpinch

# Deep scan (supply-chain hash verification, full skill decompilation)
clawpinch --deep

# JSON output for programmatic consumption
clawpinch --json

# Quiet mode — summary line only
clawpinch --quiet

# Show auto-fix commands in report
clawpinch --fix

# Skip interactive menu
clawpinch --no-interactive

# AI-powered remediation — scan then pipe to Claude for automated fixing
clawpinch --remediate

# Target specific config directory
clawpinch --config-dir /path/to/openclaw/config

# Version info
clawpinch --version

Output Schema

Each finding is a JSON object:

{
  "id": "CHK-CFG-001",
  "severity": "critical | warn | info | ok",
  "title": "Short description",
  "description": "Detailed explanation",
  "evidence": "Relevant snippet or value",
  "remediation": "How to fix",
  "auto_fix": "Shell command to fix (may be empty)"
}

Check Categories

CategoryID RangeCountDescription
ConfigurationCHK-CFG-001..01010Gateway, TLS, auth, CORS, rate limiting
SecretsCHK-SEC-001..0088API keys, passwords, tokens, .env files
NetworkCHK-NET-001..0088Port exposure, WebSocket auth, DNS rebinding
SkillsCHK-SKL-001..01010Permissions, signatures, eval patterns
PermissionsCHK-PRM-001..0088Least-privilege, wildcards, cross-tenant
CronCHK-CRN-001..0066Sandbox, timeouts, privilege escalation
CVECHK-CVE-001..0055Known vulnerabilities, outdated deps
Supply ChainCHK-SUP-001..0088Registry trust, hash verification, lockfiles

Integration Patterns

OpenClaw Skill

npx skills add https://github.com/MikeeBuilds/clawpinch --skill clawpinch

Claude Code

# Slash commands (when repo is open in Claude Code)
/clawpinch-scan    # Run security audit
/clawpinch-fix     # Scan and fix all findings

# Direct remediation
clawpinch --remediate

CI/CD

npx clawpinch --json --no-interactive | jq '[.[] | select(.severity == "critical")] | length'
# Exit code 1 if any critical findings
npx clawpinch --quiet --no-interactive

Dependencies

  • Required: bash >= 4.0, jq
  • Optional: openssl (TLS checks), nmap / ss (network checks), sha256sum / shasum (supply-chain hash verification), claude CLI (for --remediate)

Safety Rules

  1. No remote execution. Runs entirely local. No outbound connections except version metadata checks.
  2. No system modifications without consent. Scanners are read-only by default.
  3. Always redact secrets. Secrets truncated to first 4 chars + **** in all output.
  4. Treat all skills as untrusted. Deny-by-default permission policy.
  5. No privilege escalation. Never requests sudo.
  6. Findings are advisory. Output is informational — operator decides whether to act.

Exit Codes

CodeMeaning
0No critical findings
1One or more critical findings detected

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

skillguard-hardened

Security guard for OpenClaw skills, developed and maintained by rose北港(小红帽 / 猫猫帽帽). Audits installed or incoming skills with local rules plus Zenmux AI intent review, then recommends pass, warn, block, or quarantine.

Archived SourceRecently Updated
Security

api-contract-auditor

审查 API 文档、示例和字段定义是否一致,输出 breaking change 风险。;use for api, contract, audit workflows;do not use for 直接改线上接口, 替代契约测试平台.

Archived SourceRecently Updated
Security

ai-workflow-red-team-lite

对 AI 自动化流程做轻量红队演练,聚焦误用路径、边界失败和数据泄露风险。;use for red-team, ai, workflow workflows;do not use for 输出可直接滥用的攻击脚本, 帮助破坏系统.

Archived SourceRecently Updated