openclaw-security-auditAudit OpenClaw/Clawdbot deployments for misconfigurations and attack vectors. Use when a user asks for a security review of OpenClaw/Clawdbot/Moltbot, gateway/control UI exposure, skill safety, credential leakage, or hardening guidance. Produces a terminal report with OK/VULNERABLE findings and fixes.
Install via ClawdBot CLI:
clawdbot install misirov/openclaw-security-auditYou are a readâonly security auditor. Your job is to inspect configuration and environment for common OpenClaw/Clawdbot risks, then output a clear, actionable report. Do not change settings, rotate keys, or kill processes unless the user explicitly requests it.
Print a terminal report with this structure:
OPENCLAW SECURITY AUDIT REPORT
Host: <hostname> OS: <os> Kernel: <kernel>
Gateway: <status + version if available>
Timestamp: <UTC>
[CHECK ID] <Title>
Status: OK | VULNERABLE | UNKNOWN
Evidence: <command output summary>
Impact: <why it matters>
Fix: <specific steps>
...repeat per check...
If a check cannot be performed, mark UNKNOWN and explain why.
uname -acat /etc/os-releasehostnamesystemd-detect-virtcat /proc/1/cgroup | head -n 5pwdwhoamips aux | grep -i openclaw-gateway | grep -v grepopenclaw statusopenclaw gateway statusopenclaw --version (if available)ss -tulpenopenclaw config get or gateway config if available~/.openclaw/config.json), read it readâonly.0.0.0.0) without authentication.exec enabled? Is approval required?exec runs without approvals in main session.curl|wget|bash or execute shell without explicit user approval~/.openclaw/skills// )~/.openclaw/ directories.env files, token dumps, backupsfind ~/.openclaw -type f -perm -o+r -maxdepth 4 2>/dev/null | head -n 50ls -ld ~/.openclawls -l ~/.openclaw | head -n 50find / -perm -4000 -type f 2>/dev/null | head -n 200crontab -lls -la /etc/cron.* 2>/dev/nullsystemctl list-units --type=service | grep -i openclawjournalctl -u openclaw-gateway --no-pager -n 200When you mark VULNERABLE, include fixes like:
End with a summary:
SUMMARY
Total checks: <n>
OK: <n> VULNERABLE: <n> UNKNOWN: <n>
Top 3 Risks: <bullet list>
Only after explicit approval, propose exact commands to fix each issue and ask for confirmation before running them.
Generated Mar 1, 2026
A DevOps team deploys OpenClaw for internal automation but needs to ensure the gateway and control UI are not publicly exposed, preventing unauthorized access. This audit checks network bindings, authentication settings, and process privileges to harden the deployment against external attacks.
A financial institution uses Clawdbot for customer support automation and must meet regulatory standards like PCI-DSS or GDPR. The audit reviews credential storage, file permissions, and skill safety to prevent data leakage and ensure only approved tools are executed.
An organization integrates third-party skills into OpenClaw for enhanced functionality but risks malicious code execution. This scenario involves auditing installed skills for hidden instructions, shell commands, and untrusted sources to mitigate supply chain attacks.
After detecting unusual activity, a security team performs a read-only audit to identify misconfigurations like public listeners or plaintext secrets without altering evidence. The report helps trace attack vectors and plan remediation steps like token rotation.
A university runs OpenClaw in a lab environment for student projects and needs to secure it against internal threats. The audit focuses on exec policies, SUID binaries, and cron jobs to prevent privilege escalation and unauthorized persistence mechanisms.
Offer specialized audits for companies deploying OpenClaw, charging per audit or subscription for ongoing reviews. Revenue comes from identifying vulnerabilities and providing fix guidance, with upsells for remediation support.
Provide continuous monitoring and hardening of OpenClaw deployments as part of a broader security package. Revenue is generated through monthly subscriptions that include automated scans, alerting, and compliance reporting.
Develop courses and certifications for IT professionals on securing AI agents like OpenClaw. Revenue streams include course fees, certification exams, and selling audit toolkits or templates to enterprises.
đŹ Integration Tip
Integrate this skill into CI/CD pipelines to automatically audit OpenClaw deployments before production, using the read-only approach to avoid disruptions.
Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope, and suspicious patterns.
Perform a comprehensive read-only security audit of Clawdbot's own configuration. This is a knowledge-based skill that teaches Clawdbot to identify hardening opportunities across the system. Use when user asks to "run security check", "audit clawdbot", "check security hardening", or "what vulnerabilities does my Clawdbot have". This skill uses Clawdbot's internal capabilities and file system access to inspect configuration, detect misconfigurations, and recommend remediations. It is designed to be extensible - new checks can be added by updating this skill's knowledge.
Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection prevention, XSS protection, or any security-related code review.
Security check for ClawHub skills powered by Koi. Query the Clawdex API before installing any skill to verify it's safe.
Scan Clawdbot and MCP skills for malware, spyware, crypto-miners, and malicious code patterns before you install them. Security audit tool that detects data exfiltration, system modification attempts, backdoors, and obfuscation techniques.