Install
openclaw skills install ztpClawHub Security found sensitive or high-impact capabilities. Review the scan results before using.
A mandatory security audit skill for validating new code, skills, and MCP servers against the SEP-2026 Zero Trust protocol.
openclaw skills install ztpThis skill enforces the SEP-2026 Security Protocol. It provides tools to audit source code for malicious patterns, obfuscation, and unauthorized network capability. It is the Gatekeeper; no external code (Skills, MCP Servers, Python scripts) should be integrated without passing this audit.
Use this skill whenever you need to:
Run the Shield Pro 2.0 static analyzer on a target directory or file.
python3 skills/openclawSecurity/scripts/shield_pro.py --target <path_to_scan> --format json
Output: A JSON report containing CRITICAL, HIGH, and MEDIUM findings.
Action:
CRITICAL or HIGH > 0: REJECT the code.MEDIUM > 0: HALT and ask User for manual review.Check requirements.txt or package.json for typosquatting and version pinning issues.
python3 skills/openclawSecurity/scripts/shield_pro.py --target <path_to_requirements> --mode supply-chain
If available in the environment, the Agent MUST run these SOTA tools to augment Shield Pro's findings:
| Tool | Purpose | Command |
|---|---|---|
| Bandit | Python Static Analysis (Common Vulnerabilities) | bandit -r <target_dir> -f json |
| Safety | Python Dependency Check (Known CVEs) | safety check -r requirements.txt --json |
| NPM Audit | Node.js Dependency Check | npm audit --json (in package dir) |
| Trivy | Filesystem/Container Scan (Secrets/Vulns) | trivy fs <target_dir> --format json |
| Garak | LLM/Prompt Injection Testing | garak --model_type <type> --model_name <name> |
Note: If a tool is missing, log a warning in the final report but proceed with
shield_profindings.
shield_pro.py on the target.