Install
openclaw skills install driftguardDriftGuard Security Scanner+ is a local-first security drift scanner for repos, OpenClaw skills, and AI agent tools. Use to scan before trust, save trusted baselines, compare after updates, generate human review tickets, review file/hash drift, dependency drift, install-hook changes, symlink changes, prompt-injection signals, sensitive-path references, obfuscation, shell execution, network access, and risky capability diffs.
openclaw skills install driftguardTrust what you review. Compare what changed since trust.
Use this skill for local security/integrity checks and post-update drift detection on repos, installed skills, and AI agent tool folders.
This skill is intentionally narrower than a generic security scanner. Its best use is:
Run the scanner directly from the installed skill folder:
node {baseDir}/scripts/cli.js scan <path>
Save a trusted baseline after review:
node {baseDir}/scripts/cli.js trust <path>
Save a trusted baseline to a custom location:
node {baseDir}/scripts/cli.js trust <path> --baseline ./reports/skill-baseline.json
Compare a skill or repo against a saved baseline:
node {baseDir}/scripts/cli.js compare <path> --baseline ./reports/skill-baseline.json
Generate a reviewer approval ticket for a scan or comparison:
node {baseDir}/scripts/cli.js compare <path> --baseline ./reports/skill-baseline.json --review ./reports/review-ticket.md
Review the candidate repo or skill first.
node {baseDir}/scripts/cli.js scan /path/to/skill
Treat high or critical output as a stop sign until manually reviewed.
If the findings are acceptable, save a trusted baseline.
node {baseDir}/scripts/cli.js trust /path/to/skill
After the skill changes or updates, compare it to the saved baseline.
node {baseDir}/scripts/cli.js compare /path/to/skill --baseline ./reports/baseline.json
Look especially for:
For marketplace publishing, PR review, or team handoff, write a human approval checklist:
node {baseDir}/scripts/cli.js compare /path/to/skill --baseline ./reports/baseline.json --review ./reports/review-ticket.md
The ticket includes:
curl | bash, eval, exec, subprocess, os.systemfetch, axios, requests, curl, webhook usage.env, SSH keys, SOUL.md, MEMORY.md, OpenClaw configSKILL.md, SOUL.md, MEMORY.mdpackage.json, requirements.txt, and pyproject.tomlpackage.jsonPrefer a reviewer-controlled config passed with --config <file>.
By default, the scanner does not automatically honor .driftguard.json inside the target being scanned, because an untrusted target could suppress its own risky findings.
Use --use-target-config only after reviewing the target-provided suppressions.
Example:
{
"ignorePaths": ["dist/", "fixtures/"],
"ignoreRules": ["net.fetch", "shell.exec_generic", "shell.*"]
}
Use suppressions sparingly. If a rule is noisy, prefer narrowing it later instead of muting the whole category.
0 for low risk and no drift1 for medium risk or drift detected2 for high or critical riskUse this for CI or install gating.
Use --review <file> when the output needs to be read by a human before refreshing trust.
This is the best default for publishing updates because it turns scanner output into an approval artifact instead of just a machine report.
Each finding should include severity rationale and reviewer guidance so users understand why something is high, medium, or low instead of treating the scanner as a black box.
Use this skill when you want a transparent, local, deterministic trust workflow. Do not use it as the sole authority for safety. It is a heuristic scanner plus drift guard, not a guarantee.