okx-audit-logUse this skill when the user asks to export audit logs, find audit log location, view command history, 导出日志, 查看日志, 日志路径, 操作记录, 调用记录, 命令历史. Do NOT use for wal...
Install via ClawdBot CLI:
clawdbot install ok-james-01/okx-audit-logGrade Limited — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://web3.okx.comAudited Apr 17, 2026 · audit v1.0
Generated Apr 7, 2026
Developers can use the audit log to diagnose issues in their on-chain applications by reviewing command history and error details. This helps identify misconfigurations or failures in CLI or MCP interactions without needing live debugging tools.
Organizations can export audit logs to verify operational history for regulatory compliance, ensuring all on-chain commands are logged with timestamps and outcomes. This supports transparency and accountability in blockchain operations.
Teams can analyze log entries to monitor command execution times and success rates, helping optimize workflows and identify bottlenecks in on-chain processes. This aids in improving system efficiency and user experience.
Security teams can access audit logs to investigate suspicious activities or unauthorized commands, using the detailed entries to trace actions and assess potential breaches in on-chain systems.
Integrate this skill into SaaS platforms for developers, offering audit log access as a premium feature to enhance debugging and compliance capabilities. This can attract enterprise clients needing robust monitoring tools.
Provide consulting services to help businesses set up and analyze audit logs for regulatory compliance or performance optimization, leveraging the skill's structured data for actionable insights.
Bundle this skill with other developer tools in a toolkit, selling it to software teams for streamlined on-chain development and troubleshooting, adding value through integrated logging features.
💬 Integration Tip
Ensure the ONCHAINOS_HOME environment variable is set correctly to customize log paths and avoid permission issues when accessing the audit file.
Scored Apr 18, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Solve CAPTCHAs using 2Captcha service via CLI. Use for bypassing captchas during web automation, account creation, or form submission.