Audit OpenClaw Security

PassAudited by ClawScan on May 1, 2026.

Overview

This is a coherent defensive OpenClaw security-audit helper, but it runs local diagnostics and handles sensitive deployment details that users should review before sharing.

This skill appears safe for its stated defensive purpose. Before installing or using it, be aware that its helper scripts collect local security diagnostics and write them to an audit folder. Run it only on systems you are authorized to assess, do not provide raw secrets, and review or redact all outputs before sharing them.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the collector can reveal local host, firewall, network, Docker, and OpenClaw deployment details in the generated audit folder.

Why it was flagged

The helper script runs broad local diagnostic commands, including network-listener, firewall, Docker, and OpenClaw audit commands. This is expected for a security audit and is read-only/best-effort, but users should notice the breadth before running it.

Skill content
run_cmd "net_lsof_listen" lsof -nP -iTCP -sTCP:LISTEN ... run_cmd_maybe_sudo "linux_nft_ruleset" nft list ruleset ... run_cmd "openclaw_security_audit_deep_json" openclaw security audit --deep --json
Recommendation

Run it only on OpenClaw systems you own or administer, and review generated files before sharing them.

What this means

The audit may expose which OpenClaw profile, gateway auth mode, skills, plugins, and state paths exist on the machine.

Why it was flagged

The script uses the current user's local OpenClaw and filesystem access to inspect state-directory metadata and security-sensitive configuration settings. It does not copy credential files, but it does rely on local deployment authority.

Skill content
STATE_DIR="${OPENCLAW_STATE_DIR:-$HOME/.openclaw}" ... run_cmd "openclaw_state_ls" ls -la "${STATE_DIR}" ... run_cmd "openclaw_config_gateway_auth_mode" openclaw config get gateway.auth.mode
Recommendation

Use it from an account authorized to administer the OpenClaw deployment, and do not share outputs that reveal sensitive account or environment details.

What this means

Shared audit output could disclose deployment topology, enabled tools, channel posture, or other sensitive operational metadata.

Why it was flagged

The workflow can bring detailed security-audit output into the agent conversation or generated reports. The skill includes redaction guidance, but users still need to review what they paste or upload.

Skill content
Ask the user to run the following on the OpenClaw host and share the outputs ... openclaw status --deep ... openclaw security audit --deep --json
Recommendation

Prefer targeted reads and redacted outputs, use the bundled redaction script for full configs, and review all audit files before sharing them in chat or reports.