openclaw-memory-audit

Scan the agent workspace and memory logs for leaked API keys, tokens, or sensitive credentials. Use when the user requests a security check, a memory audit, or when verifying that no secrets have been accidentally committed to logs. Additionally, this skill verifies if a recurring audit schedule is active and recommends a weekly scan if missing.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "openclaw-memory-audit" with this command: npx skills add shingo0620/openclaw-memory-audit

Memory Security Audit

This skill provides a specialized tool to scan the workspace and memory log files for accidentally exposed secrets and ensures a healthy audit routine.

Security / Scope (Important)

  • This skill performs local, read-only scanning of files to detect secret-looking patterns.
  • It does not require (and must not include) any provider credentials.
  • Scheduling checks use OpenClaw's cron tool (listing/recommending a job). It does not edit configs automatically.

Audit Workflow

1. Secret Scanning

Run the scanning script to check all text files in the workspace (excluding a small set of known safe/noisy files like openclaw.json).

# from your OpenClaw workspace root:
python3 skills/openclaw-memory-audit/scripts/scan_secrets.py .

# or, if you are inside the skill folder:
python3 scripts/scan_secrets.py ..

2. Schedule Verification

Check the active cron jobs to ensure a recurring security audit is configured.

  • Call cron.list() and look for jobs related to "memory security" or "audit".
  • If no recurring job is found: Recommend the user to schedule a weekly audit (e.g., every Monday at 09:00).
  • If found: Confirm the next run time to the user.

What it checks for:

  • OpenAI API Keys (including project keys)
  • Telegram Bot Tokens
  • JWT Tokens (n8n, etc.)
  • Generic Alphanumeric Secrets (32+ characters)
  • AWS Credentials

Recommendations if secrets are found:

  1. Revoke the secret immediately at the provider's dashboard.
  2. Delete or redact the file containing the secret.
  3. Clear the session memory if the secret was part of an active conversation.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Skill Checker

Audit a target SKILL.md against the Agent Skills specification and generate a Chinese HTML report. Use when the user asks to check, audit, review, or optimiz...

Registry SourceRecently Updated
2040Profile unavailable
Security

Flue — Desktop Software Bridge

Flue is a lightweight bridge enabling command-line control of professional desktop software by executing scripts inside the app's automation runtime and retu...

Registry SourceRecently Updated
841Profile unavailable
Security

Trent OpenClaw Security Assessment

Assess your Agent deployment against security risks using Trent.

Registry SourceRecently Updated
37310Profile unavailable
Security

TrustBoost PII Sanitizer

Sanitizes PII from text before sending to LLMs. Use when handling user-generated text that may contain sensitive data, when privacy compliance is required (G...

Registry SourceRecently Updated
1540Profile unavailable