Install
openclaw skills install abaddonRed team security mode for OpenClaw. Runs an adversarial audit on demand or nightly — checks exposed ports, credential leaks, file permissions, suspicious processes, and OpenClaw config posture. Assigns a letter grade. Built for macOS deployments.
openclaw skills install abaddonMost security audits are defensive — they check what you've locked down. Abaddon runs the other direction. It thinks like an attacker. It looks for what an adversary would find, not just what you remember to check.
On demand or every night at 3:45 AM. Letter grade every time.
Network & Exposure
System Integrity
OpenClaw Configuration
File Permissions
API Key Handling
Agent Behavior
Dependencies
| Grade | Criteria |
|---|---|
| A | 0 CRITICAL, 0 HIGH |
| B | 0 CRITICAL, 1–2 HIGH |
| C | 1 CRITICAL or 3+ HIGH |
| D | 2+ CRITICAL |
| F | Active compromise indicators |
If you have Gideon (the OpenClaw observer agent), append the red team section:
cat skills/abaddon/templates/abaddon-prompt.md >> ~/.openclaw/workspace/agents/observer/AGENT_PROMPT.md
If you don't have Gideon, use the standalone agent prompt:
cp skills/abaddon/templates/abaddon-prompt.md ~/.openclaw/workspace/agents/abaddon/AGENT_PROMPT.md
bash skills/abaddon/setup/cron-seed.sh
This adds a 3:45 AM CST cron job to ~/.openclaw/cron/jobs.json. Delivers to Telegram Security topic if configured.
chmod 600 ~/.openclaw/workspace/agents/observer/AGENT_PROMPT.md
Your detection playbook should never be world-readable.
Manual trigger — say any of:
Nightly — fires automatically at 3:45 AM CST after the standard defensive audit (3:30 AM).
Every run produces two things:
memory/audits/abaddon-YYYY-MM-DD.md — full command output, evidence, remediation stepsCRITICAL findings trigger an immediate DM alert.
enoch-tuning — run lock-identity.sh after install to enforce all file permission baselines in one pass.