openclaw-security

⚠️ HIGH PRIVILEGE SECURITY AUDIT SKILL Performs comprehensive security auditing for OpenClaw deployments. Requires system-level access for legitimate security scanning purposes. All operations are read-only and local-only. Covers: environment isolation, privilege checks, port exposure, skill trust sources, version checks, process monitoring, sensitive directory changes, cron jobs, SSH audits, file integrity baselines, yellow-line operation audits, disk usage, environment variable leak detection, DLP scanning (private key/mnemonic detection), skill/MCP integrity tracking, and disaster recovery backups. Use when: security audits, firewall/SSH/update hardening, risk posture review, exposure assessment, or periodic security checks on machines running OpenClaw (laptop, workstation, Pi, VPS).

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "openclaw-security" with this command: npx skills add iaadoa/security-audit-openclaw

OpenClaw Security Audit

Comprehensive security auditing for OpenClaw deployments. This skill performs automated security checks and generates reports.

⚠️ Security Notice: This skill requires elevated system access for legitimate security auditing purposes. See SECURITY.md for detailed security declarations and data handling policies.

Quick Start

Run the security audit script:

python3 scripts/openclaw_security_audit.py

This generates:

  • Brief summary printed to stdout
  • Detailed report saved to /tmp/openclaw-security-reports/report-{DATE}.txt

What It Checks

CheckDescription
Environment IsolationDetects Docker/container/VM environments
Privilege CheckVerifies OpenClaw isn't running as root
Port ExposureChecks if Gateway port 18789 is exposed
Skill TrustLists installed skills and their sources
Version CheckCompares current vs latest OpenClaw version
Process & NetworkCaptures listening ports and top processes
Sensitive DirectoriesCounts file changes in /etc, ~/.ssh, etc.
System CronLists system timers and cron jobs
OpenClaw CronRetrieves internal OpenClaw scheduled tasks
SSH AuditRecent logins and failed SSH attempts
File IntegritySHA256 hash and permission checks
Yellow Line AuditCompares sudo logs with memory records
Disk UsageRoot partition usage and large files
Environment VariablesScans Gateway process for sensitive vars
DLP ScanDetects plaintext private keys/mnemonics (read-only)
Skill/MCP IntegrityTracks file hash changes over time
Disaster RecoveryAuto-commits OpenClaw state to Git (opt-in)

Security & Privacy

Data Handling

  • All scans are local-only - No data leaves your machine
  • Read-only operations - No system modifications (except opt-in features)
  • Opt-in external features - Git backup and Telegram notifications are disabled by default

Sensitive Operations

See SECURITY.md for detailed explanations of:

  • DLP scanning (private key/mnemonic detection)
  • Environment variable auditing
  • Git disaster recovery

Required Permissions

This skill requires system access for:

  • Running system commands (ss, top, systemctl, etc.)
  • Reading OpenClaw configuration files
  • Inspecting Gateway process environment
  • Scanning workspace files for credential leaks

Output Format

Brief Format (stdout)

OpenClaw Daily Security Brief (2026-03-11)

[OK] Environment Isolation: Running in isolated environment
[OK] Privilege Check: Complies with least privilege principle
[WARNING] Port Exposure: Port 18789 listening on all interfaces, recommend binding to 127.0.0.1
...

Warning Items:
[WARNING] Port Exposure: Port 18789 listening on all interfaces, recommend binding to 127.0.0.1

Detailed Report

Full report saved to /tmp/openclaw-security-reports/report-{DATE}.txt

Configuration

Optional Features (Disabled by Default)

To enable external operations, set the following environment variables:

Git Disaster Recovery

export SECURITY_AUDIT_ENABLE_GIT=1

Enables automatic Git commit and push of OpenClaw state to your configured remote.

Telegram Notifications

export SECURITY_AUDIT_ENABLE_TELEGRAM=1
export TELEGRAM_BOT_TOKEN="your-bot-token"
export TELEGRAM_CHAT_ID="your-chat-id"

Sends audit summary to Telegram after each run.

Scheduling

To run daily via OpenClaw cron:

openclaw cron add --name "daily-security-audit" --schedule "0 9 * * *" --command "python3 ~/.openclaw/workspace/skills/openclaw-security/scripts/openclaw_security_audit.py"

Version History

VersionDateChanges
1.0.22026-03-16Made Git backup and Telegram opt-in features (disabled by default)
1.0.12026-03-16Added SECURITY.md, enhanced documentation
1.0.02026-03-13Initial release

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Code Review Inspector

Automated code review checking for bugs, security issues, best practices, performance problems, and code style

Registry SourceRecently Updated
330Profile unavailable
Security

Vorim AI — Agent Identity & Trust

AI agent identity, permissions, trust scores, and audit trails via Vorim AI. Use when: (1) performing sensitive actions that need permission checks, (2) logg...

Registry SourceRecently Updated
190Profile unavailable
Security

Meta Ads CLI - control your ad campaigns

Control Meta/Facebook/Instagram ads through Meta's official `meta ads ...` CLI. Use for read-only audits, reporting, safe planning, and approved one-step mut...

Registry SourceRecently Updated
00Profile unavailable
Security

agent-bom registry

MCP server security registry and trust assessment — look up servers in the 427+ server security metadata registry, run pre-install marketplace checks, batch...

Registry SourceRecently Updated
7770Profile unavailable