Install
openclaw skills install auditclaw-githubGitHub compliance evidence collection for auditclaw-grc. 9 read-only checks covering branch protection, secret scanning, 2FA, Dependabot, deploy keys, audit logs, webhooks, CODEOWNERS, and CI/CD security.
openclaw skills install auditclaw-githubCompanion skill for auditclaw-grc. Collects compliance evidence from GitHub organizations using read-only API calls.
9 checks | Read-only token permissions | Evidence stored in shared GRC database
GITHUB_TOKEN env var. No credentials stored by this skill.PyGithub==2.8.1 (pinned)~/.openclaw/grc/compliance.sqlite via auditclaw-grcrepo, read:org, security_events)GITHUB_TOKEN environment variablepip install -r scripts/requirements.txtAll evidence is stored in the shared GRC database at ~/.openclaw/grc/compliance.sqlite via the auditclaw-grc skill's db_query.py script.
To run a full evidence sweep:
python3 scripts/github_evidence.py --db-path ~/.openclaw/grc/compliance.sqlite --org my-org --all
To run specific checks:
python3 scripts/github_evidence.py --db-path ~/.openclaw/grc/compliance.sqlite --org my-org --checks branch_protection,secret_scanning
| Check | What It Verifies |
|---|---|
| branch_protection | Default branch protection rules, required reviews, status checks |
| secret_scanning | Secret scanning enabled, active alert count |
| dependabot | Dependabot alerts by severity, auto-fix PRs |
| two_factor | Organization-level 2FA enforcement |
| deploy_keys | Deploy key audit, read-only vs read-write |
| audit_log | Admin audit log accessibility |
| webhooks | Webhook security (HTTPS, secrets configured) |
| codeowners | CODEOWNERS file present in repositories |
| ci_cd | GitHub Actions security, workflow permissions |
Each check produces evidence items stored with:
source: "github"type: "automated"control_id: Mapped to relevant SOC2/ISO/HIPAA controlsdescription: Human-readable finding summaryfile_content: JSON details of the check resultWhen a user asks to set up GitHub integration, guide them through these steps:
Direct user to: GitHub → Settings → Developer Settings → Personal Access Tokens → Fine-grained tokens
auditclaw-grcClassic token alternative: If fine-grained tokens unavailable, use scopes: repo, read:org, security_events
Set as GITHUB_TOKEN environment variable.
Run: python3 {baseDir}/scripts/github_evidence.py --test-connection
The exact permissions are documented in scripts/github-permissions.json. Show with:
python3 {baseDir}/../auditclaw-grc/scripts/db_query.py --action show-policy --provider github