dont-hack-me別駭我!基本安全檢測 — Security self-check for Clawdbot/Moltbot. Run a quick audit of your clawdbot.json to catch dangerous misconfigurations — exposed gateway, missing auth, open DM policy, weak tokens, loose file permissions. Auto-fix included. Invoke: "run a security check" or "幫我做安全檢查".
Install via ClawdBot CLI:
clawdbot install peterokase42/dont-hack-meSecurity self-check skill for Clawdbot / Moltbot.
Reads ~/.clawdbot/clawdbot.json and checks 7 items that cover the most
common misconfigurations. Outputs a simple PASS / FAIL / WARN report.
Say any of:
When this skill is triggered, follow these steps exactly:
Use the read tool to open ~/.clawdbot/clawdbot.json.
Parse the JSON content. If the file does not exist or is unreadable,
report an error and stop.
Also run a shell command to get the file permissions:
stat -f '%Lp' ~/.clawdbot/clawdbot.json
(On Linux: stat -c '%a' ~/.clawdbot/clawdbot.json)
gateway.bind"loopback" or "localhost" or "127.0.0.1" or "::1""loopback")"0.0.0.0", "::", or any non-loopback addressgateway.auth.mode"token" or "password""token" or "password", or the key is absent (default is "token")"off" or "none"gateway.auth.token"password" (passwords are user-chosen, don't judge length)channels..dmPolicy for each channel"pairing" — or if "open", there must be a non-empty allowFrom arraydmPolicy is "pairing", or if allowFrom has at least one entrydmPolicy is "open" and allowFrom is missing or emptychannels..groupPolicy for each channel"allowlist"groupPolicy is "allowlist" or absent (default is "allowlist")groupPolicy is "open" or "any"~/.clawdbot/clawdbot.json600 or 400 (owner read/write only)600 or 400644 or 640 (group/other can read)777, 755, 666, or anything world-writablepassword, secret, apiKey, api_key, privateKey, private_key (case-insensitive) that contain a non-empty string valuetoken fields used for gateway auth are expected and should NOT be flaggedAfter completing all checks, output a report in this exact format:
🔒 Security Check Report
1. Gateway Bind <ICON> <STATUS> — <detail>
2. Gateway Auth <ICON> <STATUS> — <detail>
3. Token Strength <ICON> <STATUS> — <detail>
4. DM Policy <ICON> <STATUS> — <detail>
5. Group Policy <ICON> <STATUS> — <detail>
6. File Permissions <ICON> <STATUS> — <detail>
7. Secrets Scan <ICON> <STATUS> — <detail>
Score: X/7 PASS, Y WARN, Z FAIL
Where:
is one of: ✅ (PASS), ⚠️ (WARN), ❌ (FAIL), ⏭️ (SKIP) is one of: PASS, WARN, FAIL, SKIP is a short explanation (e.g., "loopback", "token mode", "48 chars", "permissions 600")If any item is FAIL or WARN, do the following:
clawdbot gateway restart to apply the new settings."Use these exact fixes for each item. Edit ~/.clawdbot/clawdbot.json using the edit/write tool.
Set gateway.bind to "loopback":
{ "gateway": { "bind": "loopback" } }
Set gateway.auth.mode to "token". If no token exists yet, also generate one:
{ "gateway": { "auth": { "mode": "token", "token": "<GENERATED>" } } }
Generate the token with:
openssl rand -hex 24
That produces a 48-character hex string (192-bit entropy).
Replace the existing token with a new strong one:
openssl rand -hex 24
Write the output into gateway.auth.token.
Set dmPolicy to "pairing" for each affected channel:
{ "channels": { "<name>": { "dmPolicy": "pairing" } } }
Set groupPolicy to "allowlist" for each affected channel:
{ "channels": { "<name>": { "groupPolicy": "allowlist" } } }
Run:
chmod 600 ~/.clawdbot/clawdbot.json
This one cannot be auto-fixed safely. Instead, list each flagged key and
remind the user:
"$ENV_VAR_NAME" if the platform supports it
cp ~/.clawdbot/clawdbot.json ~/.clawdbot/clawdbot.json.bak
keys, write back the complete JSON. Never lose existing settings.
write to avoid partial states.
the user must update any paired clients with the new token.
Warn: "Your gateway token was changed. Any paired devices will need the
new token to reconnect."
For a more comprehensive audit, see community tools like clawdbot-security-check.
Based on the community-compiled "Top 10 Clawdbot/Moltbot Security Vulnerabilities" list.
Covers 7 of the 10 items that apply to typical macOS-native deployments.
小安 Ann Agent — Taiwan 台灣
Building skills and local MCP services for all AI agents, everywhere.
為所有 AI Agent 打造技能與在地 MCP 服務,不限平台。
Generated Mar 1, 2026
A small business deploys an AI agent on a shared server to handle customer inquiries via messaging platforms. This skill ensures the agent's configuration is secure, preventing unauthorized network access and protecting sensitive customer data from exposure due to misconfigurations.
A freelancer uses an AI agent for task automation and communication across multiple channels while working from public networks. The skill audits the config to enforce strict DM and group policies, reducing the risk of malicious commands from unknown users.
A university research team runs an AI agent to collect and analyze data from online sources. This skill checks for weak tokens and plaintext secrets, ensuring that API keys and research data are not leaked through insecure config files.
A healthcare provider implements an AI chatbot for patient support and appointment scheduling. The skill verifies file permissions and gateway auth to comply with data privacy regulations, preventing unauthorized access to sensitive health information.
A tech startup uses AI agents in development and testing environments to automate workflows. This skill scans for open gateway binds and loose group policies, securing the setup against internal and external threats during rapid iteration.
Offer basic security checks for free to attract users, with premium features like automated fixes, detailed reports, and integration with CI/CD pipelines for a subscription fee. Revenue comes from monthly plans and enterprise licenses.
Provide personalized security audits and configuration fixes for businesses deploying AI agents. Revenue is generated through one-time project fees or retainer contracts, with upsells for ongoing monitoring and support.
Distribute the skill as open-source software to build a community, while offering paid support, training, and enterprise-grade features. Revenue streams include support contracts, custom development, and donations.
💬 Integration Tip
Integrate this skill into your AI agent's setup process to run automatic security checks on first launch, ensuring safe defaults from the start.
Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope, and suspicious patterns.
Perform a comprehensive read-only security audit of Clawdbot's own configuration. This is a knowledge-based skill that teaches Clawdbot to identify hardening opportunities across the system. Use when user asks to "run security check", "audit clawdbot", "check security hardening", or "what vulnerabilities does my Clawdbot have". This skill uses Clawdbot's internal capabilities and file system access to inspect configuration, detect misconfigurations, and recommend remediations. It is designed to be extensible - new checks can be added by updating this skill's knowledge.
Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection prevention, XSS protection, or any security-related code review.
Security check for ClawHub skills powered by Koi. Query the Clawdex API before installing any skill to verify it's safe.
Scan Clawdbot and MCP skills for malware, spyware, crypto-miners, and malicious code patterns before you install them. Security audit tool that detects data exfiltration, system modification attempts, backdoors, and obfuscation techniques.