Aegis Shield
v0.1.0Prompt-injection and data-exfiltration screening for untrusted text. Use before summarizing web/email/social content, before replying, and especially before writing anything to memory. Provides a safe memory append workflow (scan → lint → accept or quarantine).
⭐ 0· 1.1k·7 current·8 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description (prompt-injection/data-exfiltration scanning + safe memory append) aligns with the included script's behavior: it scans, lints, sanitizes, and appends/quarantines to the agent workspace. However the script requires a separate local library at a hardcoded path (/home/openclaw/.openclaw/workspace/aegis-shield/dist/index.js) that is not included nor built by an install step, which makes the capability incomplete/unreliable as packaged.
Instruction Scope
SKILL.md instructs using the bundled script to scan and safely append to memory. The script does exactly that, but it (a) hardcodes and requires a local module outside the bundle, (b) writes directly into the agent's workspace memory and a quarantine file, and (c) when quarantining it stores the full original text verbatim in a quarantine markdown file (which could contain secrets). This contradicts the skill's own rule 'Never store secrets/tokens/keys in memory' and is a scope creep risk if inputs include secrets.
Install Mechanism
There is no install spec (instruction-only), which is low-risk. However the included script depends on a prebuilt local library at a specific workspace path that isn't supplied or built by the skill bundle; absence of an install step to produce that library is an operational incoherence (the tool may fail to run).
Credentials
The skill requests no environment variables or credentials (proportionate). It does read/write files under /home/openclaw/.openclaw/workspace (the agent's workspace/memory), which is expected for a memory-append tool but worth noting since those are sensitive files.
Persistence & Privilege
The skill is not always-enabled and is user-invocable (normal). It writes to the agent's memory directory (its intended function) but does not request global persistent privileges or modify other skills' configs.
What to consider before installing
This skill is conceptually coherent (it intends to scan and safely append memory), but exercise caution: the bundled script requires a local library at /home/openclaw/.openclaw/workspace/aegis-shield/dist/index.js that is not included or built by the package — the tool may fail or behave differently depending on what that library contains. The script will write accepted entries and full original quarantined text into the agent's workspace (memory/quarantine markdown files), so any secrets or sensitive data in input would be persisted unless you manually filter them beforehand. Before installing or running: (1) verify or inspect the required dist/index.js module that the script loads (or provide a trusted implementation), (2) confirm you are comfortable with files being written to /home/openclaw/.openclaw/workspace/memory, and (3) test on non-sensitive data first. If you cannot review the missing local library, treat the package as untrusted.Like a lobster shell, security has layers — review code before you run it.
latestvk971qc7grcynssxfrxs4sqzmch811c9bmemoryvk971qc7grcynssxfrxs4sqzmch811c9bopenclawvk971qc7grcynssxfrxs4sqzmch811c9bprompt-injectionvk971qc7grcynssxfrxs4sqzmch811c9bsecurityvk971qc7grcynssxfrxs4sqzmch811c9b
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
