Install
openclaw skills install openclaw-wardenVerify workspace file integrity and scan for prompt injection patterns in agent identity and memory files. Detects unauthorized modifications to SOUL.md, AGENTS.md, IDENTITY.md, memory files, and installed skills. Free detection layer — upgrade to openclaw-warden-pro for automated countermeasures.
openclaw skills install openclaw-wardenMonitors your workspace files for unauthorized modifications and prompt injection attacks. Existing security tools scan skills before installation — this tool watches the workspace itself after installation, catching tampering that other tools miss.
Your agent reads SOUL.md, AGENTS.md, IDENTITY.md, USER.md, and memory files on every session startup and trusts them implicitly. A compromised skill, a malicious heartbeat payload, or an unauthorized process can modify these files to:
This skill detects all of these.
Create or reset the integrity baseline. Run this after setting up your workspace or after reviewing and accepting all current file states.
python3 {baseDir}/scripts/integrity.py baseline --workspace /path/to/workspace
Check all monitored files against the stored baseline. Reports modifications, deletions, and new untracked files.
python3 {baseDir}/scripts/integrity.py verify --workspace /path/to/workspace
Scan workspace files for prompt injection patterns: hidden instructions, base64 payloads, Unicode tricks, markdown image exfiltration, HTML injection, and suspicious system prompt markers.
python3 {baseDir}/scripts/integrity.py scan --workspace /path/to/workspace
Run both integrity verification and injection scanning in one pass.
python3 {baseDir}/scripts/integrity.py full --workspace /path/to/workspace
One-line summary of workspace health.
python3 {baseDir}/scripts/integrity.py status --workspace /path/to/workspace
After reviewing a legitimate change, update the baseline for a specific file.
python3 {baseDir}/scripts/integrity.py accept SOUL.md --workspace /path/to/workspace
If --workspace is omitted, the script tries:
OPENCLAW_WORKSPACE environment variable~/.openclaw/workspace (default)| Category | Files | Alert Level on Change |
|---|---|---|
| Critical | SOUL.md, AGENTS.md, IDENTITY.md, USER.md, TOOLS.md, HEARTBEAT.md | WARNING |
| Memory | memory/*.md, MEMORY.md | INFO (expected to change) |
| Config | *.json in workspace root | WARNING |
| Skills | skills/*/SKILL.md | WARNING |
Injection patterns trigger CRITICAL alerts regardless of file category.
<system>, [SYSTEM], <<SYS>> blocks$(...) outside code blocks0 — Clean, no issues1 — Modifications detected (review needed)2 — Injection patterns detected (action needed)Python standard library only. No pip install. No network calls. Everything runs locally.
Works with OpenClaw, Claude Code, Cursor, and any tool using the Agent Skills specification.