← All skills
Tencent SkillHub · Security & Compliance

AI Shield — OpenClaw Security Audit

Security audit engine for OpenClaw configurations. Detects vulnerabilities, misconfigurations, secret leaks, and over-privileged agents. Use when the user as...

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Security audit engine for OpenClaw configurations. Detects vulnerabilities, misconfigurations, secret leaks, and over-privileged agents. Use when the user as...

⬇ 0 downloads ★ 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
README.md, SKILL.md, bin/shield.js, package.json, scripts/shield-audit.sh, src/audit.js

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.0.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 10 sections Open source page

OpenClaw Shield — Security Audit

Audit any OpenClaw config for security vulnerabilities, misconfigurations, and best-practice violations. Produces a structured JSON report with risk scores, findings, and remediation steps.

When to Use

User asks to check/audit/review their OpenClaw security User wants to harden their config before deploying User is setting up a new OpenClaw instance User asks about secret leakage or API key exposure in their config Before publishing or sharing any config file

Quick Audit (live config)

node scripts/shield-audit.sh Or directly: node SKILL_DIR/bin/shield.js audit ~/.openclaw/openclaw.json --summary

What It Checks (11 categories)

Gateway Auth — missing/weak auth, insecure UI settings Network Exposure — bind address, Tailscale funnel, wildcard proxies Channel Security — wildcard allowFrom, missing allowlists DM Policy — open DM policy without pairing Subagent Permissions — wildcard allowAgents, circular delegation chains, self-delegation Tool Permissions — over-privileged agents with tools.profile: "full" Secret Leakage — API keys, tokens, private keys in plaintext config Sandbox/Execution — missing workspace isolation, no execution policies Plugin Config — enabled plugins without channel config Heartbeat Exposure — sensitive data in heartbeat prompts Remote Config — unencrypted WebSocket, exposed remote URLs/tokens

Audit a config file

node SKILL_DIR/bin/shield.js audit <config.json> node SKILL_DIR/bin/shield.js audit <config.json> --summary # human-readable

Audit from stdin

cat config.json | node SKILL_DIR/bin/shield.js audit --stdin

Sanitize a config (strip secrets)

node SKILL_DIR/bin/shield.js sanitize <config.json>

Programmatic use

const { auditConfig } = require('SKILL_DIR/src/audit'); const config = require('./openclaw.json'); const report = auditConfig(config); console.log(report.risk_level); // "CRITICAL" | "HIGH" | "MEDIUM" | "LOW" console.log(report.overall_score); // 0-100 console.log(report.vulnerabilities); // detailed findings

Output

Returns JSON with: risk_level, overall_score (0-100), vulnerabilities[], vulnerability_count, best_practices_compliance, action_recommended, safe_to_deploy, audit_timestamp.

Workflow for Agent

Load the user's config: cat ~/.openclaw/openclaw.json Run: node SKILL_DIR/bin/shield.js audit ~/.openclaw/openclaw.json --summary Present findings to user with prioritized recommendations Offer to sanitize before sharing: node SKILL_DIR/bin/shield.js sanitize <file>

Category context

Identity, auth, scanning, governance, audit, and operational guardrails.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
3 Scripts2 Docs1 Config
  • SKILL.md Primary doc
  • README.md Docs
  • bin/shield.js Scripts
  • scripts/shield-audit.sh Scripts
  • src/audit.js Scripts
  • package.json Config