Install
openclaw skills install vext-shieldAI-native security suite for OpenClaw. Scans skills for prompt injection, data exfiltration, cognitive rootkits, semantic worms, and more. Includes static an...
openclaw skills install vext-shieldAI-native security for the agentic era. Detects threats that VirusTotal and traditional scanners cannot: prompt injection, semantic worms, cognitive rootkits, data exfiltration, permission boundary violations, and behavioral attacks.
This suite includes 6 security skills:
Scans all installed skills for 227+ threat patterns using regex matching, Python AST analysis, and encoded content detection (base64, ROT13, unicode homoglyphs).
Audits your OpenClaw installation for security misconfigurations: sandbox settings, API key storage, file permissions, network exposure, and SOUL.md integrity.
Runs 6 adversarial test batteries against any skill: prompt injection (24 payloads), data boundary, persistence, exfiltration, escalation, and worm behavior.
Watches for suspicious activity: file integrity changes, sensitive file access, outbound network connections, and suspicious processes.
Defines per-skill network and file access policies with default-deny allowlists.
Aggregates data from all VEXT Shield components into a single security posture report.
python3 skills/vext-scan/scan.py --all
python3 skills/vext-audit/audit.py
python3 skills/vext-redteam/redteam.py --skill-dir /path/to/skill
python3 skills/vext-monitor/monitor.py
python3 skills/vext-firewall/firewall.py list
python3 skills/vext-dashboard/dashboard.py
VEXT Shield requires OS-level sandbox isolation to execute untrusted code. If kernel-level sandboxing is not available, execution is refused — there is no unsafe fallback.
Sandbox enforcement:
| Platform | Network | Filesystem | Method |
|---|---|---|---|
| macOS | Blocked at kernel | Write-restricted to temp only | sandbox-exec deny-network profile |
| Linux | Blocked at kernel | Write-restricted to temp only | unshare --net network namespace |
| Other | Execution refused | Execution refused | No fallback — will not run untrusted code |
All executions include:
No bypass options exist. There is no --skip-sandbox flag, no --no-sandbox flag, no require_full_isolation parameter, and no weaker fallback mode in the codebase. The SandboxRunner class accepts only timeout_seconds — isolation is unconditional. If OS-level sandboxing is unavailable, execution raises an error. Sandbox behavioral tests always run with OS-level enforcement.
VEXT Shield itself:
Built by Vext Labs.