โ† All skills
Tencent SkillHub ยท Security & Compliance

Compliance Checker

Policy-based compliance assessment for OpenClaw skills. Define security policies, assess skills against them, track violations, and generate compliance repor...

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Policy-based compliance assessment for OpenClaw skills. Define security policies, assess skills against them, track violations, and generate compliance repor...

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
SKILL.md, scripts/checker.py

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.1.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 14 sections Open source page

Compliance Checker

Assess OpenClaw skills against defined security policies. Track compliance posture across your skill inventory with framework-mapped findings and remediation tracking.

Why This Exists

Security scanners find vulnerabilities. Trust verifiers check provenance. But neither answers: "Does this skill meet our security policy?" Compliance Checker bridges the gap โ€” define what "compliant" means for your environment, then assess every skill against those rules.

Define a policy

python3 {baseDir}/scripts/checker.py policy create --name "production" --description "Production deployment requirements"

Add rules to the policy

python3 {baseDir}/scripts/checker.py policy add-rule --policy "production" \ --rule "no-critical-findings" \ --description "No CRITICAL findings from skill scanner" \ --severity critical python3 {baseDir}/scripts/checker.py policy add-rule --policy "production" \ --rule "trust-verified" \ --description "Must have VERIFIED or TRUSTED trust level" \ --severity high python3 {baseDir}/scripts/checker.py policy add-rule --policy "production" \ --rule "no-network-calls" \ --description "No unauthorized network calls in scripts" \ --severity high python3 {baseDir}/scripts/checker.py policy add-rule --policy "production" \ --rule "no-shell-exec" \ --description "No shell=True or subprocess calls" \ --severity medium python3 {baseDir}/scripts/checker.py policy add-rule --policy "production" \ --rule "has-checksum" \ --description "Must have SHA-256 checksums for all scripts" \ --severity medium

Assess a skill against a policy

python3 {baseDir}/scripts/checker.py assess --skill "arc-budget-tracker" --policy "production"

Assess all installed skills

python3 {baseDir}/scripts/checker.py assess-all --policy "production"

View compliance status

python3 {baseDir}/scripts/checker.py status --policy "production"

Generate compliance report

python3 {baseDir}/scripts/checker.py report --policy "production" --format json python3 {baseDir}/scripts/checker.py report --policy "production" --format text

Built-in Rules

The following rules are available out of the box: RuleWhat it checksFramework mappingno-critical-findingsNo CRITICAL findings from scannerCIS Control 16, OWASP A06no-high-findingsNo HIGH findings from scannerCIS Control 16, OWASP A06trust-verifiedTrust level is VERIFIED or TRUSTEDCIS Control 2no-network-callsNo unauthorized network requestsCIS Control 9, OWASP A10no-shell-execNo shell execution patternsCIS Control 2, OWASP A03no-eval-execNo eval/exec patternsOWASP A03has-checksumSHA-256 checksums for all filesCIS Control 2no-env-accessNo environment variable accessCIS Control 3no-data-exfilNo data exfiltration patternsCIS Control 3, CIS Control 13version-pinnedAll dependencies version-pinnedCIS Control 2

Compliance Status

Each skill-policy assessment produces one of: COMPLIANT โ€” Passes all rules in the policy NON-COMPLIANT โ€” Fails one or more rules EXEMPTED โ€” Has approved exemptions for all failures UNKNOWN โ€” Not yet assessed

Exemptions

Sometimes a skill legitimately needs to violate a rule (e.g., a network monitoring skill needs network access). Record exemptions with justification: python3 {baseDir}/scripts/checker.py exempt --skill "arc-skill-scanner" \ --rule "no-network-calls" \ --reason "Scanner needs network access to check URLs against blocklists" \ --approved-by "arc"

Remediation Tracking

When a skill fails compliance, track the fix: python3 {baseDir}/scripts/checker.py remediate --skill "some-skill" \ --rule "no-shell-exec" \ --action "Replaced subprocess.call with safer alternative" \ --status fixed

Storage

Compliance data is stored in ~/.openclaw/compliance/: policies/ โ€” Policy definitions (JSON) assessments/ โ€” Assessment results per skill (JSON) exemptions/ โ€” Approved exemptions (JSON) remediations/ โ€” Remediation tracking (JSON)

Integration

Compliance Checker reads output from: arc-skill-scanner โ€” vulnerability findings arc-trust-verifier โ€” trust levels and attestations Run a full pipeline: # Scan โ†’ verify trust โ†’ assess compliance python3 {baseDir}/scripts/checker.py pipeline --skill "some-skill" --policy "production"

Category context

Identity, auth, scanning, governance, audit, and operational guardrails.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
1 Docs1 Scripts
  • SKILL.md Primary doc
  • scripts/checker.py Scripts