Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Tamper-resistant audit watchdog for Clawdbot agents. Detects and logs suspicious filesystem activity with HMAC-chained evidence.
Tamper-resistant audit watchdog for Clawdbot agents. Detects and logs suspicious filesystem activity with HMAC-chained evidence.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Security watchdog that monitors filesystem activity and creates tamper-evident logs. Even if Clawdbot is compromised, it cannot stop the watchdog, forge entries, or delete evidence.
Use the CLI wizard to guide users through installation: cd /path/to/clauditor cargo build --release
Check status: ./target/release/clauditor wizard status Returns JSON with current_step (1-6) and complete (true/false) Get next step: ./target/release/clauditor wizard next Shows WHAT it does, WHY it matters, and the exact COMMAND to run User runs the sudo command Verify: ./target/release/clauditor wizard verify Confirms step completed Repeat until complete: true
User: "Install clauditor" Agent: [runs wizard status β current_step: 1] Agent: "Step 1 of 6: Create system user This creates a 'sysaudit' user that runs the watchdog. Even if you're compromised, you can't kill a process owned by another user. Run this: sudo useradd --system --shell /usr/sbin/nologin --no-create-home sysaudit Let me know when done." User: "done" Agent: [runs wizard verify β success] Agent: [runs wizard next β step 2...]
systemctl status systemd-journaldd
./target/release/clauditor digest \ --log /var/lib/.sysd/.audit/events.log \ --key /etc/sysaudit/key \ --format markdown
sudo bash wizard/wizard.sh
Config: /etc/sysaudit/config.toml Key: /etc/sysaudit/key Logs: /var/lib/.sysd/.audit/events.log Edit config to customize watch_paths and target_uid.
Agent frameworks, memory systems, reasoning layers, and model-native orchestration.
Largest current source with strong distribution and engagement signals.