Install
openclaw skills install ralph-ultraDeep-dive security audit with 1,000 iterations (~4-8 hours). Use when user says 'deep security audit', 'ralph ultra', 'compliance audit prep', 'thorough security review', 'before major release', or 'security incident investigation'. Covers OWASP deep dive, supply chain, compliance, business logic, 4 expert personas.
openclaw skills install ralph-ultraDeep-dive security audit with thorough coverage across all attack vectors.
YOU MUST follow this loop for EVERY iteration:
NEEDS_REVIEW..ralph-report.mdCritical rules:
[ULTRA-X/1000]╔══════════════════════════════════════════════════════════════════╗
║ [ULTRA-{N}/1000] Phase {P}: {phase_name} ║
║ Mind: {active_expert_persona} ║
╠══════════════════════════════════════════════════════════════════╣
║ Check: {specific_check} ║
║ Target: {file:line / endpoint / system} ║
╠══════════════════════════════════════════════════════════════════╣
║ Result: {PASS|FAIL|WARN|N/A} ║
║ Confidence: {VERIFIED|LIKELY|PATTERN_MATCH|NEEDS_REVIEW} ║
║ Severity: {CRITICAL|HIGH|MEDIUM|LOW|INFO} ║
║ CVSS: {score} ║
╠══════════════════════════════════════════════════════════════════╣
║ Finding: {detailed description} ║
║ Exploit: {proof of concept or "N/A"} ║
║ Fix: {specific remediation} ║
╠══════════════════════════════════════════════════════════════════╣
║ Progress: [████████████░░░░░░░░] {N/10}% ║
║ Phase: {current}/{8} | ETA: ~{time} remaining ║
╚══════════════════════════════════════════════════════════════════╝
| Phase | Persona |
|---|---|
| 1, 3, 7 | Cybersecurity Veteran |
| 2, 5 | Code Auditor (Pentester) |
| 4 | Container Security Expert |
| 6 | Dependency Hunter |
| 8 | All Minds |
Full persona descriptions in references/personas.md.
| Phase | Iterations | Focus Area |
|---|---|---|
| 1 | 1-100 | Reconnaissance & Attack Surface |
| 2 | 101-250 | OWASP Top 10 Deep Dive |
| 3 | 251-400 | Authentication & Secrets |
| 4 | 401-550 | Infrastructure & Containers |
| 5 | 551-700 | Code Quality & Business Logic |
| 6 | 701-850 | Supply Chain & Dependencies |
| 7 | 851-950 | Compliance & Documentation |
| 8 | 951-1000 | Final Verification & Report |
| Iter | OWASP | Focus |
|---|---|---|
| 101-120 | A01 | Broken Access Control (IDOR, CORS, path traversal) |
| 121-140 | A02 | Cryptographic Failures (algorithms, keys, TLS) |
| 141-170 | A03 | Injection (SQL, Command, XSS, Template, Log) |
| 171-185 | A04 | Insecure Design (missing controls, business logic) |
| 186-200 | A05 | Security Misconfiguration (debug, errors, headers) |
| 201-215 | A06 | Vulnerable Components (dependency audit) |
| 216-230 | A07 | Auth Failures (credential stuffing, sessions) |
| 231-240 | A08 | Integrity Failures (deserialization, CI/CD) |
| 241-245 | A09 | Logging Failures |
| 246-250 | A10 | SSRF |
Pre-check: Determine library vs custom crypto before flagging.
Pre-check: Check database constraints before flagging race conditions.
git rev-parse --show-toplevel, git remote -vpackage.json, pyproject.toml, requirements.txt, go.mod, Cargo.tomlDockerfile, docker-compose.yml, k8s manifests, terraform.github/workflows, .gitlab-ci.yml, .circleciOn start: rename existing report. Auto-save every 50 iterations.
| Param | Default | Options |
|---|---|---|
--iterations | 1000 | 1-2000 |
--focus | all | recon, owasp, auth, infra, code, supply-chain, compliance, all |
--phase | all | 1-8 |
--resume | — | Continue from checkpoint |
Checkpoint to .ralph-report.md, output resume command, wait for new session.
/ralph-security flags issues