corsConfigure Cross-Origin Resource Sharing correctly to avoid security issues and debugging pain.
Install via ClawdBot CLI:
clawdbot install ivangdavila/corsAccess-Control-Allow-Origin: * incompatible with credentialsâmust specify exact originAccess-Control-Allow-Credentials: true required for cookies/auth headerscredentials: 'include'; XHR: withCredentials = true doesn't match subdomainsâ.example.com is invalid, not a pattern* with credentialsâspecify origin dynamically from requestAccess-Control-Allow-Headers: * works in most browsers but not allâlist explicitly for compatibilityAccess-Control-Expose-Headers: * same issueâlist headers you need to exposeexample.com matches evilexample.comâanchor the patternnull origin: sandboxed iframes, file:// URLsâusually reject, never allow as trustedVary: Origin when response depends on originâeven if you allow only oneVary: Access-Control-Request-Headers, Access-Control-Request-Method for preflight caching correctnessAccess-Control-Expose-HeadersX-Request-ID, X-RateLimit-*, etc. need explicit exposureâcommon oversightAccess-Control-Max-Age: 86400 caches preflight for 24hâreduces OPTIONS traffic significantlymode: 'no-cors' succeeds but response is emptyâusually not what you wantAccess-Control-Allow-Origin: "*", "https://example.com"âmust be single value, not listAccess-Control-Allow-Private-Network: true for localhost access from public webAI Usage Analysis
Analysis is being generated⊠refresh in a few seconds.
Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope, and suspicious patterns.
Perform a comprehensive read-only security audit of Clawdbot's own configuration. This is a knowledge-based skill that teaches Clawdbot to identify hardening opportunities across the system. Use when user asks to "run security check", "audit clawdbot", "check security hardening", or "what vulnerabilities does my Clawdbot have". This skill uses Clawdbot's internal capabilities and file system access to inspect configuration, detect misconfigurations, and recommend remediations. It is designed to be extensible - new checks can be added by updating this skill's knowledge.
Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection prevention, XSS protection, or any security-related code review.
Security check for ClawHub skills powered by Koi. Query the Clawdex API before installing any skill to verify it's safe.
Scan Clawdbot and MCP skills for malware, spyware, crypto-miners, and malicious code patterns before you install them. Security audit tool that detects data exfiltration, system modification attempts, backdoors, and obfuscation techniques.