Install
openclaw skills install security-auditor-xPerform comprehensive security audits on codebases, infrastructure configs, API designs, and architecture documents. Use this skill whenever the user wants to review code or config for vulnerabilities, assess security posture, identify attack surface, produce a findings report, or get remediation recommendations. Trigger on phrases like "security review", "audit this", "find vulnerabilities", "is this secure", "pen test", "threat model", "OWASP", "check for CVEs", "security assessment", or any request to assess risk in code, infra, or system design — even if the word "audit" isn't used. Covers web apps, APIs, cloud configs, IAM policies, secrets management, auth flows, and more.
openclaw skills install security-auditor-xA skill for performing structured security audits across code, infrastructure, APIs, and architecture. Produces prioritised findings with severity ratings and actionable remediation steps.
Use this skill for any of the following:
If the user hasn't specified, quickly confirm:
If context is obvious from what's been shared, skip straight to the audit — don't ask unnecessary questions.
Before diving into findings, briefly characterise what you're looking at:
For each issue found, produce a finding block (see format below). Organise findings by severity: Critical → High → Medium → Low → Informational.
Don't pad the report. Only include genuine issues. A clean section is fine if nothing material was found.
After all findings, include a prioritised remediation plan — what to fix first and why. If relevant, note any quick wins (easy fixes with high impact).
If the code/config shows good security practices, briefly acknowledge them. This adds credibility and context to the report.
### [SEV-###] Finding Title
**Severity**: Critical | High | Medium | Low | Informational
**Category**: [OWASP category or CWE if applicable]
**Location**: file.py:42 (or "Architecture — auth flow")
**Description**
Clear explanation of the vulnerability and why it matters.
**Evidence**
Relevant code snippet or config extract (keep it brief — just enough to illustrate).
**Impact**
What an attacker could achieve if this is exploited.
**Remediation**
Concrete steps to fix it, with a code example where helpful.
**References** (optional)
- OWASP: https://owasp.org/...
- CWE-###
| Severity | Criteria |
|---|---|
| Critical | Direct path to full compromise, data breach, RCE, or auth bypass with no mitigations |
| High | Significant risk requiring exploitation of one step; privilege escalation, SQLi, SSRF |
| Medium | Requires chaining with other issues or specific conditions; CSRF, insecure defaults |
| Low | Defence-in-depth issues, info leakage, weak configs with limited direct impact |
| Informational | Best practice gaps, code hygiene, no direct security impact |
Use for detailed code or config reviews. Includes all sections: scope, recon summary, findings (with evidence), remediation plan, positive observations.
Use when the user wants a fast pass or the input is small. Bullet-point findings with severity tags, brief descriptions, and one-line remediations. No full report structure.
Use when explicitly requested. Plain English, no code snippets, business risk framing. Suitable for sharing with non-technical stakeholders.
Default to Full Audit Report unless the user indicates otherwise or the input is under ~50 lines of code/config.
If the user mentions a compliance framework, map critical/high findings to relevant controls where appropriate:
| Framework | Notes |
|---|---|
| SOC 2 | Map to Trust Service Criteria (CC6, CC7, CC8, CC9) |
| ISO 27001 | Map to Annex A controls |
| OWASP Top 10 | Always reference where applicable |
| GDPR | Flag PII handling, data retention, breach notification gaps |
| PCI-DSS | Flag cardholder data exposure, network segmentation issues |
Only include compliance mapping if explicitly requested or if a specific framework was mentioned in scope.