Security Guardian
v1.1.0Automated security auditing for OpenClaw projects. Scans for hardcoded secrets (API keys, tokens) and container vulnerabilities (CVEs) using Trivy. Provides...
Security Guardian
System for automated security auditing and credential protection.
Core Workflows
1. Secret Scanning
Scan specific project directories for hardcoded credentials.
- Tool:
scripts/scan_secrets.py - Usage:
python3 $WORKSPACE/skills/security-guardian/scripts/scan_secrets.py <path_to_project> - Workflow:
- Execute scan on a specific project or directory.
- If findings are reported (exit code 1):
- Review the file and line number.
- Transition: Move the secret to a secure vault (e.g., using the
mema-vaultskill). - Redact: Replace the plaintext secret in the source code with an environment variable or a vault lookup call.
2. Container Vulnerability Scan
Analyze Docker images for vulnerabilities prior to deployment.
- Tool:
scripts/scan_container.sh - Usage:
bash $WORKSPACE/skills/security-guardian/scripts/scan_container.sh <image_name> - Logic: Identify
HIGHandCRITICALseverities. Recommend base image updates or security patches.
Security Guardrails
- Scope Limitation: Avoid scanning system-level directories. Focus only on relevant project workspaces.
- Credential Isolation: Hardcoded secrets are considered a high-severity finding.
- Dependencies: Container scanning requires
trivyto be installed on the host system.
Integration
- Vaulting: This skill identifies leaks. Remediation should be performed using a dedicated credential manager like
mema-vault.
Version tags
auditdevopslatestscannersecretssecuritytrivy
