Install
openclaw skills install ralph-ultraDeep-dive security audit with 1,000 iterations (~4-8 hours). Use when user says 'deep security audit', 'ralph ultra', 'compliance audit prep', 'thorough secu...
openclaw skills install ralph-ultraDeep-dive security audit with thorough coverage across all attack vectors.
YOU MUST follow this loop for EVERY iteration:
NEEDS_REVIEW..ralph-report.mdCritical rules:
[ULTRA-X/1000]╔══════════════════════════════════════════════════════════════════╗
║ [ULTRA-{N}/1000] Phase {P}: {phase_name} ║
║ Mind: {active_expert_persona} ║
╠══════════════════════════════════════════════════════════════════╣
║ Check: {specific_check} ║
║ Target: {file:line / endpoint / system} ║
╠══════════════════════════════════════════════════════════════════╣
║ Result: {PASS|FAIL|WARN|N/A} ║
║ Confidence: {VERIFIED|LIKELY|PATTERN_MATCH|NEEDS_REVIEW} ║
║ Severity: {CRITICAL|HIGH|MEDIUM|LOW|INFO} ║
║ CVSS: {score} ║
╠══════════════════════════════════════════════════════════════════╣
║ Finding: {detailed description} ║
║ Exploit: {proof of concept or "N/A"} ║
║ Fix: {specific remediation} ║
╠══════════════════════════════════════════════════════════════════╣
║ Progress: [████████████░░░░░░░░] {N/10}% ║
║ Phase: {current}/{8} | ETA: ~{time} remaining ║
╚══════════════════════════════════════════════════════════════════╝
| Phase | Persona |
|---|---|
| 1, 3, 7 | Cybersecurity Veteran |
| 2, 5 | Code Auditor (Pentester) |
| 4 | Container Security Expert |
| 6 | Dependency Hunter |
| 8 | All Minds |
Full persona descriptions in references/personas.md.
| Phase | Iterations | Focus Area |
|---|---|---|
| 1 | 1-100 | Reconnaissance & Attack Surface |
| 2 | 101-250 | OWASP Top 10 Deep Dive |
| 3 | 251-400 | Authentication & Secrets |
| 4 | 401-550 | Infrastructure & Containers |
| 5 | 551-700 | Code Quality & Business Logic |
| 6 | 701-850 | Supply Chain & Dependencies |
| 7 | 851-950 | Compliance & Documentation |
| 8 | 951-1000 | Final Verification & Report |
| Iter | OWASP | Focus |
|---|---|---|
| 101-120 | A01 | Broken Access Control (IDOR, CORS, path traversal) |
| 121-140 | A02 | Cryptographic Failures (algorithms, keys, TLS) |
| 141-170 | A03 | Injection (SQL, Command, XSS, Template, Log) |
| 171-185 | A04 | Insecure Design (missing controls, business logic) |
| 186-200 | A05 | Security Misconfiguration (debug, errors, headers) |
| 201-215 | A06 | Vulnerable Components (dependency audit) |
| 216-230 | A07 | Auth Failures (credential stuffing, sessions) |
| 231-240 | A08 | Integrity Failures (deserialization, CI/CD) |
| 241-245 | A09 | Logging Failures |
| 246-250 | A10 | SSRF |
Pre-check: Determine library vs custom crypto before flagging.
Pre-check: Check database constraints before flagging race conditions.
git rev-parse --show-toplevel, git remote -vpackage.json, pyproject.toml, requirements.txt, go.mod, Cargo.tomlDockerfile, docker-compose.yml, k8s manifests, terraform.github/workflows, .gitlab-ci.yml, .circleciOn start: rename existing report. Auto-save every 50 iterations.
| Param | Default | Options |
|---|---|---|
--iterations | 1000 | 1-2000 |
--focus | all | recon, owasp, auth, infra, code, supply-chain, compliance, all |
--phase | all | 1-8 |
--resume | — | Continue from checkpoint |
Checkpoint to .ralph-report.md, output resume command, wait for new session.
/ralph-security flags issues