Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Security monitoring and infrastructure health checks for OpenClaw agents. Run breach monitoring (HaveIBeenPwned), SSL certificate expiry checks, GitHub security audits, credential rotation tracking, secret scanning, git hygiene, token watchdog, and permission audits. Use when performing security scans, checking credential rotation status, auditing repos for leaked secrets, or monitoring SSL certificates and infrastructure health.
Security monitoring and infrastructure health checks for OpenClaw agents. Run breach monitoring (HaveIBeenPwned), SSL certificate expiry checks, GitHub security audits, credential rotation tracking, secret scanning, git hygiene, token watchdog, and permission audits. Use when performing security scans, checking credential rotation status, auditing repos for leaked secrets, or monitoring SSL certificates and infrastructure health.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Security monitoring toolkit for OpenClaw agents. Runs automated checks against your infrastructure and reports issues.
Before first use, create sentinel.conf in the skill directory: cp sentinel.conf.example sentinel.conf Edit sentinel.conf with your values: DOMAINS โ Space-separated list of domains to check SSL certificates GITHUB_USER โ GitHub username for repo audits KNOWN_REPOS โ Space-separated list of expected repo names (unexpected repos trigger warnings) MONITOR_EMAIL โ Email address for HaveIBeenPwned breach checks HIBP_API_KEY โ Optional; HIBP v3 API key ($3.50/mo) for automated breach lookups Also customize credential-tracker.json with your own credentials and rotation policies. A template is provided.
cd <skill-dir> bash sentinel.sh
Formatted report to stdout with color-coded severity JSON report saved to reports/YYYY-MM-DD.json Exit codes: 0 = all clear, 1 = warnings, 2 = critical
Check certificate expiry for configured domains. Warns at <30 days, critical at <14 days.
List repos and check Dependabot/vulnerability alert status Review recent account activity for anomalies Flag unexpected repositories
Query HIBP API for breached accounts (requires API key) Falls back to manual check URL if no key is set
Read credential-tracker.json and flag credentials that are overdue, approaching expiry, or never rotated. Supports policies: quarterly (90d), 6_months (180d), annual (365d), auto.
ScriptPurposescripts/secret-scanner.shScan repos/files for leaked secrets and API keysscripts/git-hygiene.shAudit git history for security issuesscripts/token-watchdog.shMonitor token validity and expiryscripts/permission-auditor.shAudit file and access permissionsscripts/skill-auditor.shAudit installed skills for securityscripts/full-audit.shRun all scripts in sequence
During heartbeats or on request: Run bash sentinel.sh from the skill directory Review output for WARN or CRITICAL items Report findings to the human if anything needs attention Update credential-tracker.json when credentials are rotated
# Weekly Monday 9am 0 9 * * 1 cd /path/to/arc-sentinel && bash sentinel.sh >> reports/cron.log 2>&1
openssl (SSL checks) gh CLI authenticated (GitHub checks) curl (HIBP) python3 (JSON processing)
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.