Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

openclaw security auditor

v1.0.0

OpenClaw Security Auditor (OSA) - Comprehensive security auditing tool for OpenClaw deployments. Provides 60-second security diagnosis, risk scoring (0-100),...

0· 190·0 current·0 all-time
byAlbert Liu@albertlsy588

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for albertlsy588/openclaw-security-auditor-skill.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "openclaw security auditor" (albertlsy588/openclaw-security-auditor-skill) from ClawHub.
Skill page: https://clawhub.ai/albertlsy588/openclaw-security-auditor-skill
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install openclaw-security-auditor-skill

ClawHub CLI

Package manager switcher

npx clawhub@latest install openclaw-security-auditor-skill
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The declared purpose — auditing and suggesting fixes for OpenClaw configs — matches the actions in the scripts (reading ~/.openclaw/*.json, producing reports, and applying configuration profiles). However several callers and examples in SKILL.md expect classes/functions (e.g., SecurityScanner, ReportGenerator) that are not provided by the included scripts. Instead, scripts/security_scanner.py tries to import these from an external package path (openclaw-security-auditor / osa). The skill does not declare or install that dependency, which is inconsistent.
Instruction Scope
Runtime instructions and code operate on user configuration files under the user's home (~/.openclaw) and write backups and modified configs via scripts/config_fixer.py. That is within scope for a security auditor, but it's a high-impact action (writes to user config). The SKILL.md examples also reference files and modules (i18n.py, osa.* classes) that are missing from the packaged files, creating ambiguity about what will actually run.
!
Install Mechanism
There is no install spec, yet the code expects an external package/module ('openclaw-security-auditor' / package 'osa') located outside the skill directory (scripts/security_scanner.py inserts a path three levels up). No instructions to install that package are provided. This missing dependency and the path-manipulation import are a significant coherence/operational issue and increase risk (execution may fail or load unexpected code if that path exists).
Credentials
The skill requests no environment variables or external credentials. The files operate only on local config files under ~/.openclaw and produce local reports. No unrelated secrets are requested. That is proportionate to an auditing tool, though the capability to change configs should be noted as impactful.
Persistence & Privilege
The skill is not always-enabled and does not request persistent platform privileges. However, it includes tools that can modify the user's OpenClaw configuration files (config_fixer.py makes backups then writes changes). This is a legitimate but sensitive capability—users should be aware the skill can and will write to their config if run with non-dry-run options.
What to consider before installing
What to consider before installing or running this skill: 1) Missing dependency / ambiguous import: scripts/security_scanner.py inserts a path outside the skill and imports osa.scanner_fixed / osa.reporter / osa.models. The skill bundle does NOT include an 'osa' package or an 'openclaw-security-auditor' directory. That means the skill will either fail to run or will import code from whatever exists at that external path on the host. Do not run this on a production machine until you confirm where that dependency comes from and inspect it. 2) Inconsistent APIs and missing files: SKILL.md examples reference SecurityScanner and ReportGenerator classes and files like scripts/i18n.py and multiple reference docs that are not present in the package. The examples may not work as written. Ask the author for a clear install/run guide and for the missing files or a packaged dependency. 3) File writes to your config: The fixer script will backup and then modify your OpenClaw config file by default (unless you use --dry-run). Always make your own backup, inspect the changes, or run in a safe environment first. Review the exact modifications (_apply_*_profile functions) to ensure they match your intent. 4) No install instructions: The skill contains code but no install specification. If you want to run it, run it in an isolated sandbox (container/VM) first, and inspect any external package (osa / openclaw-security-auditor) before allowing it to run against your real configuration. 5) Recommended actions: Request the maintainer to (a) include or document the osa dependency and provide a reproducible install step, (b) fix the SKILL.md examples to match the shipped modules/functions, and (c) clarify which files are safe to run and which are placeholders. If you must try it now, run test_skill.py in a controlled environment and do not run config_fixer.py without --dry-run and manual review.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c6qwxagtjghbrkz0d39a8zh835c7r
190downloads
0stars
1versions
Updated 21h ago
v1.0.0
MIT-0

OpenClaw Security Auditor Skill

Overview

This skill provides comprehensive security auditing capabilities for OpenClaw deployments. It can scan OpenClaw configurations, identify security vulnerabilities, provide risk scores, and suggest remediation steps.

When to Use This Skill

  • User requests security audit or vulnerability assessment
  • User wants to check OpenClaw security configuration
  • User needs security hardening recommendations
  • User asks about OpenClaw security best practices
  • User wants to validate their OpenClaw configuration
  • User mentions "security", "audit", "vulnerability", "hardening" in context of OpenClaw

Core Capabilities

Security Scanning

  • 47-point security check: Covers 7 major security domains
  • Gateway Configuration: Binding modes, authentication, tokens
  • Session Security: dmScope, pairing strategies, timeouts
  • Tool Permissions: exec profiles, allowed tools, filesystem access
  • Channel Security: dmPolicy, mention requirements, allowlists
  • Network Security: Firewall status, port exposure
  • Logging Security: Log levels, sensitive data handling
  • Skill Security: Auto-install policies, source restrictions

Risk Assessment

  • 0-100 Security Score: Comprehensive risk scoring system
  • Three Security Modes: Conservative, Balanced (recommended), Aggressive
  • Severity Classification: Critical, High, Medium, Low, Info levels
  • Bilingual Reporting: Chinese/English dual-language output

Automated Remediation

  • Fix Suggestions: Specific commands for each identified issue
  • Mode Recommendations: Guidance on appropriate security modes
  • Configuration Templates: Best practice configuration examples

Usage Workflow

Step 1: Security Scan

Run comprehensive security scan on OpenClaw configuration:

# Import required modules
from scripts.security_scanner import SecurityScanner
from scripts.report_generator import ReportGenerator

# Scan current OpenClaw configuration
scanner = SecurityScanner(config_path="~/.openclaw/openclaw.json", mode="balanced")
results = scanner.scan()

Step 2: Generate Report

Generate bilingual security report:

# Generate bilingual Markdown report
reporter = ReportGenerator(results, mode="balanced")
bilingual_report = reporter.generate("bilingual")

# Save report to user's directory
with open("~/.openclaw/security-audit-report.md", "w") as f:
    f.write(bilingual_report)

Step 3: Provide Recommendations

Based on scan results, provide specific remediation steps:

  • Critical Issues: Immediate fixes required
  • High Issues: Fix as soon as possible
  • Medium/Low Issues: Optimization suggestions
  • Security Mode Selection: Recommend appropriate mode based on use case

Available Scripts

Core Scripts

  • scripts/security_scanner.py - Main security scanning engine
  • scripts/report_generator.py - Multi-format report generation
  • scripts/config_fixer.py - Automated configuration fixing
  • scripts/i18n.py - Bilingual translation support

Utility Scripts

  • scripts/scan_current.py - Quick scan of current configuration
  • scripts/fix_security.py - Apply security fixes interactively
  • scripts/debug_session.py - Debug session configuration issues

Reference Documentation

Security Best Practices

  • references/security-modes.md - Detailed security mode configurations
  • references/config-guide.md - OpenClaw security configuration guide
  • references/vulnerability-db.md - Common OpenClaw security vulnerabilities

API Documentation

  • references/api-reference.md - Complete API reference for security auditor
  • references/integration-guide.md - CI/CD and automation integration guide

Output Formats

Report Types

  • Markdown: Human-readable bilingual reports
  • JSON: Machine-readable format for automation
  • HTML: Visual web-based reports

Report Structure

Each report includes:

  • Security score and risk level
  • Summary of passed/failed checks
  • Detailed issue descriptions with severity levels
  • Specific fix commands and recommendations
  • Security mode guidance

Security Mode Guidance

Conservative Mode (Production)

  • Use Case: Production environments, sensitive data
  • Score Target: 95+
  • Key Settings: loopback binding, token auth, minimal permissions

Balanced Mode (Development) ⭐

  • Use Case: Personal development, small teams
  • Score Target: 75-90
  • Key Settings: loopback binding, reasonable permissions, standard logging

Aggressive Mode (Testing)

  • Use Case: Isolated test environments only
  • Score Target: 40-60
  • Key Settings: Full permissions, minimal restrictions

Example Usage

Basic Security Audit

User: "Can you audit my OpenClaw security configuration?"

Assistant: 
1. Load security_scanner.py script
2. Run scan on ~/.openclaw/openclaw.json
3. Generate bilingual report
4. Present security score and key findings
5. Provide specific fix recommendations

Mode Recommendation

User: "What security mode should I use for my development setup?"

Assistant:
1. Explain three security modes
2. Recommend Balanced mode for development
3. Provide configuration examples
4. Show expected security score range

Vulnerability Remediation

User: "How do I fix the security issues in my OpenClaw setup?"

Assistant:
1. Run security scan to identify specific issues
2. Categorize issues by severity
3. Provide step-by-step fix commands
4. Verify fixes with re-scan if requested

Limitations and Considerations

Scope Limitations

  • Only scans OpenClaw configuration files
  • Does not perform network penetration testing
  • System-level security (firewall, OS hardening) requires manual intervention
  • Cannot modify configurations without user approval

Safety Considerations

  • Always backup configuration before applying fixes
  • Test fixes in non-production environments first
  • Some fixes require system administrator privileges
  • Conservative mode may break existing functionality

Integration Capabilities

CI/CD Integration

  • JSON output format for automated security gates
  • Exit codes based on security score thresholds
  • Integration with GitHub Actions, GitLab CI, etc.

Monitoring Integration

  • Scheduled security scans
  • Trend analysis and reporting
  • Alert notifications for critical issues

Getting Started

To use this skill, simply ask for a security audit of your OpenClaw configuration. The skill will automatically:

  1. Locate your OpenClaw configuration file
  2. Perform comprehensive security scanning
  3. Generate detailed bilingual report
  4. Provide actionable security recommendations

The skill is designed to be safe and non-destructive - it only reads configuration files and provides recommendations, never makes automatic changes without explicit user approval.

Comments

Loading comments...