Install
openclaw skills install nxtsecure-openclawUse when auditing and remediating an OpenClaw Linux host with a nightly 23:00 security run. Covers firewall status, fail2ban bans, SSH hardening with key-onl...
openclaw skills install nxtsecure-openclawOriginal requested prompt, preserved verbatim: "Effectuez un audit de sécurité tous les soirs à 23h faite un cron."
Use this skill when the user wants a repeatable OpenClaw host security audit, a nightly cron job, or immediate remediation of common hardening gaps.
npm install -g nxtsecure-openclaw
then verify with:
nxtsecure openclaw doctor{baseDir}/../../bin/nxtsecure.mjs.nxtsecure openclaw config init --output ./openclaw-security-audit.conf or copy {baseDir}/references/openclaw-security-audit.conf.example.nxtsecure openclaw audit --config ./openclaw-security-audit.conf to execute the audit and remediation workflow.nxtsecure openclaw cron install --log ~/openclaw-security-audit.log.audit de sécurité réussi.The audit must verify:
fail2ban active and total banned IP count collected.22.80% on persistent filesystems.When SSH is enabled, the agent must help the user migrate safely instead of changing access blindly.
2222 only as a fallback example, not a forced default.ssh-keygen -t ed25519 -C "openclaw-admin"ssh-copy-id -p <new-port> <user>@<host>
or append the public key to ~/.ssh/authorized_keys with correct permissions.ssh -p <new-port> <user>@<host>If the agent cannot verify that key-based access on the new port works, it must explain the exact manual steps still required and avoid risky lockout actions.
When the user wants file or link reputation checks, the agent must use VirusTotal without an API key:
browser tool, not the VirusTotal API.Use the bundled helper:
nxtsecure openclaw vt url https://example.testnxtsecure openclaw vt file /path/to/sample.bin{baseDir}/scripts/openclaw_virustotal_check.sh --url https://example.test{baseDir}/scripts/openclaw_virustotal_check.sh --file /path/to/sample.binOpenClaw browser flow:
browser.startbrowser.open or browser.navigate to https://www.virustotal.com/gui/home/url for URLsbrowser.open or browser.navigate to https://www.virustotal.com/gui/home/upload for filesbrowser.snapshot and browser.act to type, upload, and inspect detection resultsroot when possible. Some remediations require privileged access.ufw, then firewalld, then a non-empty nftables ruleset for firewall detection.sshd -T when available and falls back to SSH config files.22 is treated as non-compliant.unattended-upgrades on Debian or Ubuntu and dnf-automatic on RPM-based hosts.journalctl, lastb, or /var/log/auth.log, depending on what the host exposes.0 23 * * *.{baseDir}/../../package.json: npm package definition for the nxtsecure openclaw CLI.{baseDir}/../../bin/nxtsecure.mjs: npm CLI entrypoint for audit, cron, VirusTotal, and config init.{baseDir}/scripts/openclaw_security_audit.sh: audit and remediation runner.{baseDir}/scripts/openclaw_virustotal_check.sh: VirusTotal URL and file reputation helper.{baseDir}/scripts/install_cron.sh: idempotent cron installer for 23:00 every day.{baseDir}/references/openclaw-security-audit.conf.example: baseline configuration template.