Install
openclaw skills install security-network-hardeningAudit and harden an OpenClaw host and its network exposure. Use for security checks, hardening, firewall setup, network exposure review, metrics endpoint restriction, OpenClaw gateway security fixes, or step-by-step remediation on a Linux host running OpenClaw.
openclaw skills install security-network-hardeningAudit first, then harden with explicit approval. Keep this file short; read the references when needed.
Run:
uname -a
cat /etc/os-release
id
ss -ltnup 2>/dev/null || ss -ltnp 2>/dev/null
openclaw security audit --deep
openclaw update status
openclaw status --deep
If firewall state matters, also run:
ufw status verbose || true
firewall-cmd --state 2>/dev/null || true
nft list ruleset 2>/dev/null || true
Check for these first:
tools.elevated.allowFrom.*gateway.nodes.denyCommandsRead these only when relevant:
references/ufw-playbook.mdreferences/openclaw-fix-patterns.mdWhen the user wants generated files, create:
firewall-rules.mdapply-firewall.shscripts/rollback-firewall.shscripts/verify-firewall.shufw status verbose and ss -ltnp.After fixes, verify with:
openclaw security audit --deep
openclaw gateway status
python3 -m json.tool ~/.openclaw/openclaw.json >/dev/null
sudo ufw status verbose
ss -ltnp
Success means: