Install
openclaw skills install zt4ai-self-auditZero Trust security audit for AI agent workspaces, skills, and configurations. Based on Microsoft's Zero Trust for AI (ZT4AI) framework and the "Caging the A...
openclaw skills install zt4ai-self-auditAudit your agent's skills, workspace, and configuration against Zero Trust for AI principles.
AI agents process instructions and data as indistinguishable tokens in a context window. This means:
This skill applies three frameworks:
Scan all three skill locations:
echo "=== System ===" && ls /usr/lib/node_modules/openclaw/skills/ 2>/dev/null
echo "=== User ===" && ls ~/.openclaw/skills/ 2>/dev/null
echo "=== Workspace ===" && ls ~/.openclaw/workspace/skills/ 2>/dev/null
Assign every skill to a risk category using the classification guide in references/risk-classification.md.
Categories:
For each skill, evaluate against the checklist in references/audit-checklist.md.
Quick reference — the three questions:
Find all executable code in skills:
find ~/.openclaw/skills/ ~/.openclaw/workspace/skills/ \
-type f \( -name "*.sh" -o -name "*.py" -o -name "*.js" \) \
2>/dev/null | sort
For each script, check:
grep -li "API_KEY\|SECRET\|TOKEN\|PASSWORD" <file>)grep -li "curl\|wget\|requests\|fetch\|http" <file>)grep -li "openclaw.json\|\.env\|/etc/" <file>)grep -li "eval\|exec\|subprocess\|system(" <file>)Create SHA256 checksums of all skill files for future drift detection:
find ~/.openclaw/skills/ ~/.openclaw/workspace/skills/ \
-type f \( -name "*.md" -o -name "*.sh" -o -name "*.py" -o -name "*.js" -o -name "*.json" \) \
-exec sha256sum {} \; | sort -k2 > memory/skill-integrity-baseline.md
To verify against an existing baseline:
sha256sum -c memory/skill-integrity-baseline.md 2>&1 | grep -v ": OK$"
Any output indicates modified files — investigate before trusting.
Check the self-modification surface:
grep -rli "api_key\|password\|secret" ~/.openclaw/workspace/)Assess outbound network restrictions:
# Check for firewall rules
iptables -L OUTPUT -n 2>/dev/null || echo "No iptables access"
ufw status 2>/dev/null || echo "No UFW"
# Check what the agent can reach
curl -s -o /dev/null -w "%{http_code}" https://httpbin.org/get --max-time 5
If the agent has unrestricted outbound access, flag as a security gap — a compromised agent could exfiltrate data to any destination.
Generate a structured report using the template in references/report-template.md. Include:
Save report to memory/zt4ai-audit-YYYY-MM-DD.md.
After the initial audit:
sha256sum -c against baseline)references/risk-classification.md — Detailed classification criteria with examplesreferences/audit-checklist.md — Per-skill audit checklistreferences/action-tiers.md — Graduated trust model for agent actionsreferences/report-template.md — Audit report template