Install
openclaw skills install veridicusscan-mcp-analystUse when the user wants to inspect a prompt, local file, or public HTTPS URL with VeridicusScan through its MCP bridge, triage prompt-injection or hidden-ins...
openclaw skills install veridicusscan-mcp-analystUse this skill only for the VeridicusScan MCP surface, not for changing the app code itself.
VeridicusScan is a local-first scanner and runtime-defense tool. This skill is for analyst tasks such as scanning websites, files, prompts, job-application artifacts, and agent-runtime flows through the MCP bridge.
open_session returns session_limit_reached, tell the user another active session is still open.scan_text.health or list_methods if availability is unclear.open_session.scan_url for live public HTTPS websitesscan_file for local filesscan_text for prompts, snippets, and extracted contentscan_file returns default_context_mode = "sanitized_only", prefer safe_context for downstream use and make clear that report surfaces are redacted by design.scan_url returns non_public_network_url, explain that VeridicusScan intentionally blocks loopback, private-network, .local, .localhost, and resolved internal targets.sanitized_only, say that explicitly instead of implying raw evidence is available.non_public_network_url or session_limit_reached.Use these methods when the user is evaluating agent safety rather than content scanning:
ingest_memory for A1 memory ingestionretrieve_memory for A2 retrieval validationselective_disclosure and evaluate_selective_disclosure for disclosure quality and privacy checksscope_tools before planning or executionguard_plan before approving a plangate_action before approving a specific tool actionAlways preserve the returned tool scope and pass the authoritative scope back into guard_plan and gate_action. Do not invent or forge scope values.
Recommended ordering for tool-governance tasks:
open_sessionscope_toolsguard_plangate_actionclose_session