Tophant Clawvault Operator

v0.2.4

Operate ClawVault services, configuration, vault presets, and scanning from OpenClaw

0· 85·0 current·0 all-time
byAli0th@martin2877

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for martin2877/tophant-clawvault-operator.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Tophant Clawvault Operator" (martin2877/tophant-clawvault-operator) from ClawHub.
Skill page: https://clawhub.ai/martin2877/tophant-clawvault-operator
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Required binaries: python3, pgrep
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Canonical install target

openclaw skills install martin2877/tophant-clawvault-operator

ClawHub CLI

Package manager switcher

npx clawhub@latest install tophant-clawvault-operator
Security Scan
Capability signals
CryptoRequires walletRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, required binaries (python3, pgrep), included script, and declared permissions match an operator that starts/stops services, hot-patches via a local REST API, and edits per-user config. No unrelated cloud credentials or surprising external services are requested.
Instruction Scope
Runtime instructions and the bundled script focus on local operations (probing ports, hitting 127.0.0.1:8766, editing ~/.ClawVault, reading files you point it at). The skill explicitly supports scanning other installed skills' directories and adding cron jobs; these are powerful but are documented and user-initiated. The instruction to always run the bundled script is unusual but not inherently risky.
Install Mechanism
No install spec — the skill is shipped as an included Python script and docs. That is low-risk compared with arbitrary network downloads. The script expects a venv created by the companion installer skill rather than attempting to fetch code at runtime.
Credentials
No environment variables or external credentials are required. The declared network permission is used for local dashboard communication; the code and docs state only localhost (127.0.0.1) is contacted. This is proportionate to the operator's purpose, though local network permissions could be abused if dashboard_host were changed.
Persistence & Privilege
The skill does not request always:true and does not modify other skills, but it can add entries to the user's crontab and write configuration under ~/.ClawVault. Those are expected for scheduled scans but are persistent and should be considered by users who need strict crontab control.
Assessment
This skill appears to do what it says: manage a local ClawVault installation and perform user-triggered scans. Before installing, ensure you (a) have the companion installer skill installed and trust it, (b) are comfortable with the skill reading files you explicitly pass it (and optionally ~/.openclaw/skills when you run skill_audit), and (c) accept that it may add cron entries to your user crontab. If you store secrets in other installed skills or need strict crontab/change-control, run this in a disposable environment first or avoid using scan-schedule-add and skill_audit modes.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

Binspython3, pgrep
configvk97at21c59bjkqtcamsqrwvbv185dzkblatestvk97at21c59bjkqtcamsqrwvbv185dzkboperationsvk97at21c59bjkqtcamsqrwvbv185dzkbproxyvk97at21c59bjkqtcamsqrwvbv185dzkbscanningvk97at21c59bjkqtcamsqrwvbv185dzkbsecurityvk97at21c59bjkqtcamsqrwvbv185dzkbvaultvk97at21c59bjkqtcamsqrwvbv185dzkb
85downloads
0stars
5versions
Updated 4d ago
v0.2.4
MIT-0

ClawVault Operator

Operate ClawVault services, manage configuration, apply vault presets, scan text/files, and schedule local filesystem security scans — all from OpenClaw agents.

Complements the tophant-clawvault-installer skill (install/health/generate-rule/test/uninstall) by covering day-to-day operational commands.

What This Skill Does

This operator skill installs no software and opens no outbound network connections except to 127.0.0.1:8766. See SECURITY.md for the full capability list.

Prerequisites

This skill requires ClawVault to be installed via the tophant-clawvault-installer skill first:

openclaw skills install tophant-clawvault-installer
/tophant-clawvault-installer install --mode quick

How to Run

IMPORTANT: All commands MUST be executed using the Python script bundled with this skill.

Do NOT run clawvault or any other command directly. Always use:

python3 SKILL_DIR/clawvault_ops.py <command> [options]

Where SKILL_DIR is the directory containing this SKILL.md file (typically ~/.openclaw/workspace/skills/tophant-clawvault-operator/ or ~/.openclaw/skills/tophant-clawvault-operator/).

Add --json to any command for machine-readable JSON output.

Commands

/tophant-clawvault-operator start

Start ClawVault proxy and dashboard services.

python3 SKILL_DIR/clawvault_ops.py start --json
python3 SKILL_DIR/clawvault_ops.py start --mode strict --json
python3 SKILL_DIR/clawvault_ops.py start --port 9000 --json
python3 SKILL_DIR/clawvault_ops.py start --no-dashboard --json

/tophant-clawvault-operator stop

Stop running ClawVault services.

python3 SKILL_DIR/clawvault_ops.py stop --json
python3 SKILL_DIR/clawvault_ops.py stop --force --json

/tophant-clawvault-operator status

Check if ClawVault services are running.

python3 SKILL_DIR/clawvault_ops.py status --json

/tophant-clawvault-operator scan

Scan text for sensitive data, prompt injection, and dangerous commands.

python3 SKILL_DIR/clawvault_ops.py scan "sk-proj-abc123" --json

/tophant-clawvault-operator scan-file

Scan a local file for hardcoded secrets and sensitive data.

python3 SKILL_DIR/clawvault_ops.py scan-file /path/to/.env --json

/tophant-clawvault-operator config-show

Show current ClawVault configuration.

python3 SKILL_DIR/clawvault_ops.py config-show --json

/tophant-clawvault-operator config-get

Get a specific configuration value.

python3 SKILL_DIR/clawvault_ops.py config-get guard.mode --json
python3 SKILL_DIR/clawvault_ops.py config-get detection.pii --json

/tophant-clawvault-operator config-set

Set a configuration value (auto-detects type: bool/int/float/string). If dashboard is running, changes to file_monitor, guard, and detection sections are hot-patched immediately.

python3 SKILL_DIR/clawvault_ops.py config-set guard.mode strict --json
python3 SKILL_DIR/clawvault_ops.py config-set detection.pii true --json

/tophant-clawvault-operator config-append

Append a value to a list configuration field. Use this for adding watch paths, intercept hosts, etc. If dashboard is running, changes are hot-patched immediately (no restart needed).

python3 SKILL_DIR/clawvault_ops.py config-append file_monitor.watch_paths /home/cs/password --json
python3 SKILL_DIR/clawvault_ops.py config-append proxy.intercept_hosts api.deepseek.com --json

/tophant-clawvault-operator config-remove

Remove a value from a list configuration field.

python3 SKILL_DIR/clawvault_ops.py config-remove file_monitor.watch_paths /home/cs/password --json
python3 SKILL_DIR/clawvault_ops.py config-remove proxy.intercept_hosts api.deepseek.com --json

/tophant-clawvault-operator vault-list

List all vault presets.

python3 SKILL_DIR/clawvault_ops.py vault-list --json

/tophant-clawvault-operator vault-show

Show detailed configuration of a vault preset.

python3 SKILL_DIR/clawvault_ops.py vault-show full-lockdown --json

/tophant-clawvault-operator vault-apply

Apply a vault preset to the active configuration. If the dashboard is running, changes are hot-patched immediately (no restart needed).

python3 SKILL_DIR/clawvault_ops.py vault-apply full-lockdown --json
python3 SKILL_DIR/clawvault_ops.py vault-apply privacy-shield --json

/tophant-clawvault-operator vault-create

Create a custom vault preset from the current active configuration.

python3 SKILL_DIR/clawvault_ops.py vault-create "My Custom Preset" --json
python3 SKILL_DIR/clawvault_ops.py vault-create "Dev Mode" --id dev-mode --description "Relaxed settings" --json

/tophant-clawvault-operator vault-update

Update a custom vault preset's metadata. Builtin presets cannot be modified.

python3 SKILL_DIR/clawvault_ops.py vault-update my-preset --name "Renamed" --json
python3 SKILL_DIR/clawvault_ops.py vault-update my-preset --from-current --json

/tophant-clawvault-operator vault-delete

Delete a custom vault preset. Builtin presets cannot be deleted.

python3 SKILL_DIR/clawvault_ops.py vault-delete my-preset --json

/tophant-clawvault-operator vault-active

Show which vault preset is currently active.

python3 SKILL_DIR/clawvault_ops.py vault-active --json

/tophant-clawvault-operator local-scan

Run an on-demand local filesystem security scan.

python3 SKILL_DIR/clawvault_ops.py local-scan --json
python3 SKILL_DIR/clawvault_ops.py local-scan --type vulnerability --path /srv --json
python3 SKILL_DIR/clawvault_ops.py local-scan --type skill_audit --max-files 50 --json

Scan types: credential, vulnerability, skill_audit

/tophant-clawvault-operator scan-schedule-add

Add a cron-scheduled local scan.

python3 SKILL_DIR/clawvault_ops.py scan-schedule-add --cron "0 2 * * *" --type credential --json

/tophant-clawvault-operator scan-schedule-list

List all configured scan schedules.

python3 SKILL_DIR/clawvault_ops.py scan-schedule-list --json

/tophant-clawvault-operator scan-schedule-remove

Remove a scheduled scan by ID.

python3 SKILL_DIR/clawvault_ops.py scan-schedule-remove <schedule_id> --json

/tophant-clawvault-operator scan-history

Show recent local scan results.

python3 SKILL_DIR/clawvault_ops.py scan-history --json
python3 SKILL_DIR/clawvault_ops.py scan-history --limit 50 --json

/tophant-clawvault-operator agent-list

List all registered agents and their detection configurations.

python3 SKILL_DIR/clawvault_ops.py agent-list --json

/tophant-clawvault-operator agent-set

Create or update per-agent configuration. Use --no-* flags to disable specific detection categories.

python3 SKILL_DIR/clawvault_ops.py agent-set "MyAgent" --guard-mode permissive --json
python3 SKILL_DIR/clawvault_ops.py agent-set "TrustedAgent" --disabled --json
python3 SKILL_DIR/clawvault_ops.py agent-set "OpenClaw" --guard-mode permissive --no-prompt-injection --no-dangerous-commands --json

/tophant-clawvault-operator agent-remove

Remove an agent configuration by ID or name.

python3 SKILL_DIR/clawvault_ops.py agent-remove <agent_id> --json

Quick Examples

# Set the skill directory path
CV="python3 ~/.openclaw/workspace/skills/tophant-clawvault-operator/clawvault_ops.py"

# Start services and verify
$CV start --mode interactive --json
$CV status --json

# Manage configuration
$CV config-get guard.mode --json
$CV config-set guard.mode strict --json

# Add/remove watch paths (hot-patches if dashboard running)
$CV config-append file_monitor.watch_paths /home/cs/password --json
$CV config-remove file_monitor.watch_paths /home/cs/password --json

# Apply a security preset (hot-patches if dashboard running)
$CV vault-list --json
$CV vault-apply file-protection --json
$CV vault-active --json

# Create and manage custom presets
$CV vault-create "My Security Profile" --description "Customized for our team" --json
$CV vault-delete my-security-profile --json

# Schedule daily credential scan
$CV scan-schedule-add --cron "0 2 * * *" --type credential --json

# Stop services
$CV stop --json

Requirements

  • Python 3.10+
  • ClawVault installed via tophant-clawvault-installer skill
  • pyyaml (pip install pyyaml if not available)

Permissions

  • execute_command - Start/stop services, run scans
  • write_files - Write configuration changes to ~/.ClawVault/
  • read_files - Read configuration, vault presets, scan history
  • network - Probe service ports, dashboard API calls

License

MIT (c) 2026 Tophant SPAI Lab

Comments

Loading comments...