OpenClaw Security Configurator

v1.0.1

为OpenClaw提供企业级安全配置和监控功能,解决高系统权限带来的安全风险,符合金融合规要求。

0· 161·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for 2389275723/openclaw-security-skill.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "OpenClaw Security Configurator" (2389275723/openclaw-security-skill) from ClawHub.
Skill page: https://clawhub.ai/2389275723/openclaw-security-skill
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Required binaries: openclaw
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install openclaw-security-skill

ClawHub CLI

Package manager switcher

npx clawhub@latest install openclaw-security-skill
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description promise enterprise security and token monitoring for OpenClaw and the shipped scripts implement checks (service status, config permissions, API-key detection, network exposure) and a token-monitoring loop. That core capability matches the stated purpose. Minor mismatch: marketing/docs claim payment (Alipay) and other high-level features (three-model routing, payment integration) that are not implemented in the provided scripts — these are product/marketing claims, not implemented code.
Instruction Scope
SKILL.md and the scripts restrict activity to local system inspection: running openclaw commands, systemctl, journalctl, ss/grep, reading /etc, ~/.openclaw, /var/log, and generating reports. The scripts do examine environment variables (e.g., OPENAI_API_KEY etc.) and may print masked snippets; they also optionally send alerts via email/webhook if configured. There are no hardcoded external exfiltration endpoints in the code.
Install Mechanism
The registry lists no automated install spec (instruction-only), which is lower risk. The repo's INSTALL.md suggests wget from a GitHub releases URL and creating a systemd unit — a conventional install path. No obscure download hosts or extracted arbitrary archives are used in the provided docs, but the registry metadata/owner are unknown and the INSTALL.md's wget target is an external URL (GitHub); confirm the release URL before running.
Credentials
The skill declares no required environment variables, but the scripts inspect common API-related env vars (API_KEY, OPENAI_API_KEY, ANTHROPIC_API_KEY, etc.) and will log masked values if they exist. This is plausible for token usage monitoring, but it means the skill will read environment variables and look for secrets even though none were declared as required. Alert/webhook/email delivery depends on optional config vars (WEBHOOK_URL, EMAIL_RECIPIENT).
Persistence & Privilege
The skill does not request 'always: true' or other elevated platform privileges. It expects to be run by a system administrator for full checks and the documentation describes creating a systemd service and adding startup hooks — standard for a local monitor. This requires administrative rights to install/enable, which is consistent with its function.
Assessment
What to consider before installing: - Source/trust: The package owner and homepage are not authoritative (unknown). Verify the release tarball URL and repository (the docs mention GitHub) and confirm the code provenance before running on production systems. - Review scripts before running: The shipped scripts read system logs, config files (e.g., /etc/openclaw/*, ~/.openclaw/*, /var/log/*) and environment variables and will write reports/logs under ~/.openclaw/security and /tmp or /var/log. Make sure you are comfortable with that access and with where logs/reports will be stored. - Sensitive data exposure: The security-check script detects environment keys (OPENAI_API_KEY, ANTHROPIC_API_KEY, etc.) and prints masked values to stdout and to generated reports. If you run the script unattended, these outputs may be captured in logs; remove or protect sensitive env vars or run in a controlled environment. - Alert channels are optional but can exfiltrate alerts externally: Webhook/email alerting only occurs if you configure WEBHOOK_URL or EMAIL settings, but if you do, verify the destination and secret handling. The code uses curl to POST webhook payloads from the configured URL. - Installation implications: Installing as a systemd service (as suggested) requires root/sudo and will run continuously; test the scripts in a sandbox first. The provided systemd system/service templates embed the current working directory — if you enable the service, confirm ExecStart points to the correct, trusted path. - Marketing vs implementation: The README/Differentiation claim Alipay/payment integration, AI-model routing and other premium features that are not present in the provided scripts. Treat those as roadmap/marketing rather than implemented behavior. - Operational settings: Check default thresholds (ALERT_THRESHOLD, DAILY_LIMIT, CHECK_INTERVAL) and log retention to avoid excessive logging and ensure the monitor does not flood your system. - Recommended steps: (1) inspect the code yourself or have a trusted admin do so, (2) run scripts in a non-production/test environment first, (3) back up current OpenClaw configs, (4) do not enable the systemd service until satisfied with behavior, and (5) if you need production-grade financial compliance, validate the tool against your compliance requirements and vendor/source identity. Confidence note: The files and behavior are coherent with the stated purpose, but because the package owner/homepage are not authoritative and some marketing claims are unimplemented, I rate confidence as medium. Additional assurance would come from a verified repository, signed releases, or an author identity with a track record.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

🔒 Clawdis
Binsopenclaw
compliancevk97ahe18psypze5qdwt9c4x0fd832tc1enterprisevk97ahe18psypze5qdwt9c4x0fd832tc1latestvk97ahe18psypze5qdwt9c4x0fd832tc1monitoringvk97ahe18psypze5qdwt9c4x0fd832tc1securityvk97ahe18psypze5qdwt9c4x0fd832tc1
161downloads
0stars
2versions
Updated 1mo ago
v1.0.1
MIT-0

OpenClaw Security Configurator

技能概述

基于市场调研发现,OpenClaw面临以下安全挑战:

  1. 高系统权限与金融合规冲突
  2. 控制面板暴露导致数据泄露风险
  3. 缺乏默认安全配置
  4. Token消耗可能失控

本技能提供企业级安全解决方案,帮助用户安全部署和使用OpenClaw。

核心功能

1. 安全配置检查

  • 检查OpenClaw当前安全配置
  • 识别潜在安全风险
  • 提供合规建议

2. 权限管理

  • 限制OpenClaw系统权限
  • 配置最小权限原则
  • 监控权限使用情况

3. 数据保护

  • 加密敏感配置数据
  • 防止控制面板暴露
  • 审计数据访问记录

4. Token消耗监控

  • 实时监控Token使用情况
  • 预警异常消耗
  • 提供优化建议

5. 合规报告

  • 生成安全合规报告
  • 符合金融行业要求
  • 提供整改建议

使用方法

基础安全检查

openclaw security check

配置安全加固

openclaw security harden

监控Token消耗

openclaw security monitor-token

生成合规报告

openclaw security compliance-report

安装要求

  • OpenClaw已安装并运行
  • 系统管理员权限
  • 基本的Linux命令行知识

定价策略

免费版

  • 基础安全检查
  • 基本配置建议
  • 社区支持

专业版($49/月)

  • 完整安全配置
  • Token消耗监控
  • 合规报告生成
  • 优先技术支持

企业版($299/月)

  • 定制化安全策略
  • 24/7监控告警
  • 金融合规认证
  • 专属技术支持

市场定位

目标用户

  1. 金融机构使用OpenClaw
  2. 企业级OpenClaw部署
  3. 对安全要求高的技术团队
  4. 需要合规认证的组织

竞争优势

  1. 专门针对OpenClaw安全痛点
  2. 符合金融行业合规要求
  3. 基于实际市场调研开发
  4. 持续更新应对新威胁

开发路线图

v1.0(本周发布)

  • 基础安全检查功能
  • 简单配置加固
  • Token基础监控

v1.1(下月初)

  • 高级权限管理
  • 数据加密功能
  • 详细合规报告

v1.2(下月底)

  • 实时监控告警
  • 自动化修复工具
  • API集成接口

技术支持

  • 文档:完整的使用文档和最佳实践
  • 社区:Discord技术支持频道
  • 邮件:security@openclaw-skills.com
  • 紧急响应:24小时内响应安全漏洞

法律声明

本技能提供安全建议和工具,但不保证100%安全。用户需自行评估风险并采取适当措施。对于因使用本技能造成的任何损失,开发者不承担责任。

Comments

Loading comments...