Install
openclaw skills install n0nu-security-auditLogs risky OpenClaw agent actions, conducts activity audits, and reviews OpenClaw configs for security risks without blocking operations.
openclaw skills install n0nu-security-auditLightweight, observer-only security layer for OpenClaw. Logs agent actions, audits activity history, and reviews OpenClaw config for risks. Does not block or interrupt any operations.
Three things this skill does:
./scripts/log_event.sh after notable operations./scripts/run_audit.sh on request./scripts/audit_config.sh on requestThis skill is purely observational — it never blocks or delays any operation. After completing a risky action, log it:
./scripts/log_event.sh <level> <category> "<summary>" "<detail>" <action>
When to log:
| Level | When |
|---|---|
| CRITICAL | Remote code execution (curl|bash), credential/key file reads, persistence writes (cron, authorized_keys, launchd), privilege escalation |
| WARN | Bulk file deletion, sensitive file reads, external requests with dynamic URLs, shell env modification |
| INFO | Normal workspace operations, standard dev tooling — skip unless building an audit trail |
Categories: exec | file_write | network | credential | persistence
Actions: allowed | flagged
Note: blocked_soft is removed — this skill does not block. If something was risky but the user explicitly requested it, use allowed. Otherwise flagged.
Example:
./scripts/log_event.sh WARN exec "bulk delete outside workspace" "rm -rf /tmp/build" flagged
./scripts/log_event.sh CRITICAL credential "SSH key read" "cat ~/.ssh/id_rsa" allowed
When user asks for a security audit or activity review:
./scripts/run_audit.sh 7 # last 7 days (default)
./scripts/run_audit.sh 30 # last 30 days
Read the output, then:
notify_on_audit_complete: true in config → send via message tool to configured channelWhen user asks "is my OpenClaw config secure?" or similar:
./scripts/audit_config.sh # standard audit
./scripts/audit_config.sh --deep # also probe live Gateway
./scripts/audit_config.sh --fix # audit + apply safe fixes
This script delegates to openclaw security audit (the native CLI tool), which checks gateway auth, tool permissions, network exposure, file permissions, and other config foot-guns. Read the output and present findings to the user with context and recommendations.
Users can enable proactive notifications by creating logs/security-audit-config.json:
{
"notify_channel": "dingtalk",
"notify_on": ["CRITICAL", "WARN"],
"notify_on_audit_complete": true
}
Supported channels: whatever OpenClaw has configured (dingtalk, telegram, discord, etc.).
Default if file missing: log-only, no notifications.
When notify_on is set and you log a matching event, send a brief message via the message tool after logging.
logs/security-audit.log is created automatically on first eventlogs/security-audit-config.json for notificationscron skill for periodic audits (user sets interval)