Install
openclaw skills install openclaw-safe-auditSecurity audit and credential hardening tool for OpenClaw instances. Scan for sensitive files, detect credential exposure, check gateway configuration, and m...
openclaw skills install openclaw-safe-auditA comprehensive security toolkit for OpenClaw instances. Protect your credentials, audit your configuration, and maintain best security practices.
# Clone to your OpenClaw skills directory
cd ~/.openclaw/skills
git clone <repository> openclaw-security-audit
# Or manually copy the skill files
Run a comprehensive security audit:
python ~/.openclaw/skills/openclaw-security-audit/audit.py
This will:
Migrate credentials to environment variables:
python ~/.openclaw/skills/openclaw-security-audit/harden.py
This will:
IMPORTANT: After running harden.py, you must set environment variables before OpenClaw can access credentials.
Edit config.json to customize scanning behavior:
{
"exclude_dirs": ["node_modules", ".git", "__pycache__"],
"whitelist": ["secret-input.ts"],
"sensitive_extensions": [".env", ".key", ".pem"],
"sensitive_keywords": ["password", "secret", "credentials"]
}
| Check | Description | Risk Level |
|---|---|---|
| Sensitive files | .env, .key, .pem files | MEDIUM |
| Credential exposure | API keys, secrets in config | HIGH/CRITICAL |
| Gateway bind mode | 0.0.0.0 exposure | CRITICAL |
| Gateway auth | Missing authentication | HIGH |
| File permissions | Config file permissions | INFO |
Audit reports are saved to:
~/.openclaw/security-tools/security_report_YYYYMMDD_HHMMSS.jsonThis tool:
This tool does NOT:
MIT License - Feel free to use, modify, and distribute.
Contributions welcome! Please ensure:
This tool is for security auditing your own OpenClaw instance. Always review changes before applying them. The authors are not responsible for misconfiguration or data loss.