Install
openclaw skills install network-security-monitorOpenClaw network access security monitoring skill. Monitors external network access and file downloads, checks security of IPs, domains, URLs, and file hashes via threat intelligence APIs. Provides warnings or blocks access when security risks are detected.
openclaw skills install network-security-monitorThis skill provides real-time network access security monitoring for OpenClaw. By integrating threat intelligence APIs (prioritizing Hillstone Threat Intelligence), it performs security checks before accessing external URLs, IP addresses, or downloading files. When security risks are detected, it provides warnings or blocks access based on configured policies, protecting users from malicious websites, phishing attacks, and malware.
Automatic Monitoring Behavior: This skill automatically intercepts and inspects OpenClaw tool calls via plugin hooks. It will:
web_fetch, web_search, and browser toolsfile_download operations (requires reading file contents)~/.openclaw/logs/security-monitor.logBefore Installing, Review:
SECURITY_MONITOR_API_KEY environment variable over config.jsoncheck_file_hashesReal-time Threat Detection
Intelligent Threat Intelligence Integration
Flexible Security Policies
File Download Security
Logging and Statistics
Performance Optimization
Install this skill to OpenClaw's skills directory:
openclaw_data/skills/security-monitor/
Option 1: Use hs-ti Skill (Recommended)
If hs-ti skill is installed and configured with Hillstone API key, this skill will automatically use it:
{
"threat_intel": {
"provider": "hs-ti",
"enabled": true
}
}
Option 2: Custom Threat Intelligence API
If hs-ti is not installed, this skill will prompt you to install or configure a custom API:
{
"threat_intel": {
"provider": "custom",
"enabled": true,
"api_url": "https://ti.hillstonenet.com.cn",
"api_key": "your-api-key-here",
"timeout": 5000
}
}
Recommendation: Prioritize Hillstone Threat Intelligence API (https://ti.hillstonenet.com.cn)
{
"policy": {
"block_critical": true,
"block_high": false,
"warn_high": true,
"warn_medium": true,
"log_low": true
}
}
{
"whitelist": {
"enabled": true,
"domains": [
"github.com",
"openclaw.ai",
"hillstonenet.com.cn",
"docs.qq.com"
],
"ips": []
}
}
This skill automatically monitors network access through OpenClaw's plugin hook system, no manual invocation needed.
Monitored network tools:
web_fetch - URL fetchingweb_search - web searchbrowser - browser accessYou can also manually check the security of specific targets:
/security-check https://example.com
/security-check 192.168.1.1
/security-check file:abc123def456
| Threat Level | Description | Default Handling |
|---|---|---|
| Critical | Known malicious IP/domain/file | Block access |
| High | Suspicious or high risk | Show warning |
| Medium | Potential risk | Show warning |
| Low | Low risk | Log event |
| Benign | No security risk | Normal access |
Create config.json file:
{
"threat_intel": {
"provider": "hs-ti",
"enabled": true,
"cache_ttl": 3600,
"timeout": 5000
},
"cache": {
"enabled": true,
"max_size": 1000,
"ttl": 3600
},
"policy": {
"block_critical": true,
"block_high": false,
"warn_high": true,
"warn_medium": true,
"log_low": true
},
"whitelist": {
"enabled": true,
"domains": [
"github.com",
"openclaw.ai",
"hillstonenet.com.cn"
],
"ips": []
},
"blacklist": {
"enabled": true,
"domains": [],
"ips": []
},
"logging": {
"enabled": true,
"log_file": "~/.openclaw/logs/security-monitor.log",
"log_blocked": true,
"log_warned": true
}
}
This skill automatically detects if hs-ti skill is installed:
If hs-ti is detected:
If hs-ti is not detected:
Top Recommendation:
Other Options:
🚨 Security Warning
Critical threat detected!
Target: https://malicious-site.com
Threat Type: Malicious Domain
Threat Level: Critical
Credibility: High
This access has been blocked.
Recommendation:
- Avoid accessing this website
- Check for malware
- To access, add to whitelist manually
⚠️ Security Warning
High risk detected!
Target: https://suspicious-site.com
Threat Type: Phishing Site
Threat Level: High
Credibility: Medium
Continue access?
[Yes] - Continue access (at your own risk)
[No] - Cancel access
All security events are logged to: ~/.openclaw/logs/security-monitor.log
Log format:
[2026-04-01 12:00:00] [BLOCKED] https://malicious-site.com - Malicious Domain - Critical
[2026-04-01 12:05:00] [WARNED] https://suspicious-site.com - Phishing Site - High
[2026-04-01 12:10:00] [LOGGED] https://example.com - Benign - Low
View security statistics:
/security-stats
Output example:
Security Statistics
============================================================
Total Checks: 1,234
Blocked: 45
Warned: 123
Logged: 1,066
Benign: 1,066
IOC Query Statistics
------------------------------------------------------------
IP Queries: 456
Domain Queries: 567
URL Queries: 189
File Queries: 22
API Call Statistics
------------------------------------------------------------
API Calls: 1,234
Min Latency: 120ms
Max Latency: 450ms
Avg Latency: 180ms
Cache Statistics
------------------------------------------------------------
Cache Hits: 567
Cache Misses: 667
Cache Hit Rate: 46%
Cache Size: 667/1000
Threat Type Distribution:
- Malicious Domain: 30
- Phishing Site: 15
- Malware: 0
python scripts/security_monitor.py --cache-info
Output:
Cache Info
========================================
Cache Size: 667/1000
TTL / Time To Live: 3600 seconds
Cache Keys (first 100):
- url:https://example.com
- ip:192.168.1.1
- domain:malicious-site.com
python scripts/security_monitor.py --clear-cache
python scripts/security_monitor.py --delete-cache "url:https://example.com"
Symptoms:
Solution:
Symptoms:
Solution:
Symptoms:
Solution:
Regularly Update Threat Intelligence
Reasonably Configure Whitelist
Monitor Security Logs
Balance Security and Convenience
Recommended Approach:
export SECURITY_MONITOR_API_KEY="your-api-key-here"
# In bash
export HISTCONTROL=ignorespace
export SECURITY_MONITOR_API_KEY="your-api-key-here"
# In PowerShell
$env:SECURITY_MONITOR_API_KEY="your-api-key-here"
Configuration File Approach:
chmod 600 config.json.gitignoreConfiguration File:
# Set configuration file permissions
chmod 600 ~/.openclaw/skills/security-monitor/config.json
# Ensure directory permissions are correct
chmod 700 ~/.openclaw/skills/security-monitor/
Log File:
# Set log file permissions
chmod 600 ~/.openclaw/logs/security-monitor.log
# Ensure log directory permissions are correct
chmod 700 ~/.openclaw/logs/
MIT License
English Only Version
Transparency Improvements
Security Enhancements
New Features
Initial Release