Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Monitors agent file access, API calls, and communications to detect suspicious behavior, log events, and generate actionable security reports.
Monitors agent file access, API calls, and communications to detect suspicious behavior, log events, and generate actionable security reports.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Version: 1.0.0 Author: Manas AI Category: Security & Monitoring
AgentGuard is a comprehensive security monitoring skill that watches over agent operations, detecting suspicious behavior, logging communications, and providing actionable security reports.
Track all file read/write operations with pattern analysis. Trigger: Continuous background monitoring Command: agentguard monitor files [--watch-dir <path>] What it detects: Unusual file access patterns (bulk reads, sensitive directories) Access to credential files (.env, .secrets, keys) Unexpected write operations to system directories File exfiltration attempts (large reads followed by network calls)
Monitor outbound API calls for suspicious activity. Command: agentguard monitor api What it detects: Calls to unknown/untrusted endpoints Unusual API call frequency (rate anomalies) Sensitive data in request payloads Authentication token exposure Calls to known malicious domains
Log all external communications for audit trails. Command: agentguard log comms [--output <path>] Logs include: HTTP/HTTPS requests (sanitized) WebSocket connections Email sends Message platform outputs (Telegram, Discord, etc.) Timestamp, destination, payload hash
ML-lite pattern analysis for behavioral anomalies. Command: agentguard detect anomalies [--sensitivity <low|medium|high>] Detection methods: Baseline deviation (learns normal patterns) Time-of-day anomalies Sequence analysis (unusual operation chains) Volume spikes New destination detection
Generate comprehensive daily security reports. Command: agentguard report [--period <daily|weekly|monthly>] Report includes: Activity summary Alert breakdown by severity Top accessed resources Communication destinations Anomaly timeline Recommendations
monitoring: enabled: true file_watch_dirs: - ~/clawd - ~/.clawdbot exclude_patterns: - "*.log" - "node_modules/**" - ".git/**" alerts: sensitivity: medium # low, medium, high channels: - telegram alert_on: - credential_access - bulk_file_read - unknown_api_endpoint - data_exfiltration cooldown_minutes: 15 api_monitoring: trusted_domains: - api.anthropic.com - api.openai.com - api.telegram.org - api.elevenlabs.io block_on_suspicious: false # true = prevent call, false = alert only logging: retention_days: 30 log_dir: ~/.agentguard/logs hash_sensitive_data: true reporting: auto_daily_report: true report_time: "09:00" report_channel: telegram
agentguard start Enables all monitoring features with default config.
agentguard status Returns current threat level, active monitors, recent alerts.
agentguard investigate --timerange "last 2 hours" --type file_access
agentguard report --now
agentguard alerts --last 24h --severity high
agentguard trust add api.newservice.com --reason "Required for X integration"
LevelColorMeaningExampleINFO🔵Normal logged activityFile read in workspaceLOW🟢Minor deviationSlightly elevated API callsMEDIUM🟡Notable anomalyAccess to .env fileHIGH🟠Potential threatBulk credential accessCRITICAL🔴Immediate action neededData exfiltration pattern
Receives file/API operation hooks Sends alerts via configured channels Integrates with heartbeat for periodic checks
Shares threat data with other security skills Can block operations (if configured) Provides audit logs for compliance skills
~/.agentguard/ ├── logs/ │ ├── file_access/ │ ├── api_calls/ │ └── communications/ ├── baselines/ │ └── behavior_model.json ├── alerts/ │ └── YYYY-MM-DD.json └── reports/ └── YYYY-MM-DD_report.md
No external data transmission - All processing is local Sensitive data hashing - Credentials are never logged in plain text Configurable retention - Auto-delete old logs Encrypted storage - Optional AES encryption for logs
→ Increase baseline learning period or reduce sensitivity
→ Check file_watch_dirs config covers target directories
→ Verify report_time format and timezone settings
ScriptPurposeexecution/monitor.pyCore monitoring daemonexecution/detector.pyAnomaly detection engineexecution/logger.pyStructured logging handlerexecution/alerter.pyAlert dispatch systemexecution/reporter.pyReport generation
AgentGuard is designed with defense-in-depth principles. It assumes agents can be compromised or manipulated, and provides visibility into their operations. For maximum security, run AgentGuard in a separate process with limited write access to prevent a compromised agent from disabling monitoring.
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.