Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Evaluates agent actions for security risks, enforcing least-privilege policies with allow, deny, or confirmation decisions and secret redaction.
Evaluates agent actions for security risks, enforcing least-privilege policies with allow, deny, or confirmation decisions and secret redaction.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Runtime least-privilege firewall for agent/skill actions. It evaluates a requested action and returns one of: ALLOW (safe to execute) DENY (blocked by policy) NEED_CONFIRMATION (risky; require explicit confirmation) It also returns a sanitizedAction with secrets redacted, plus a structured audit record. This is not a gateway hardening tool. It complements gateway security scanners by enforcing per-action policy at runtime.
Exfiltration to unknown domains Prompt-injection โsend secretsโ attempts (secret detection + redaction) Reading sensitive local files (~/.ssh, ~/.aws, .env, etc.) Unsafe execution patterns (rm -rf, curl | sh, etc.)
Provide an action object to evaluate: { "traceId": "optional-uuid", "caller": { "skillName": "SomeSkill", "skillVersion": "1.2.0" }, "action": { "type": "http_request | file_read | file_write | exec", "method": "GET|POST|PUT|DELETE", "url": "https://api.github.com/...", "headers": { "authorization": "Bearer ..." }, "body": "...", "path": "./reports/out.json", "command": "rm -rf /" }, "context": { "workspaceRoot": "/workspace", "mode": "strict | balanced | permissive", "confirmed": false } }
{ "decision": "ALLOW | DENY | NEED_CONFIRMATION", "riskScore": 0.42, "reasons": [{"ruleId":"...","message":"..."}], "sanitizedAction": { "...": "..." }, "confirmation": { "required": true, "prompt": "..." }, "audit": { "traceId":"...", "policyVersion":"...", "actionFingerprint":"..." } }
Exec disabled by default HTTP requires TLS Denylist blocks common exfil hosts (pastebins, raw script hosts) File access is jailed to workspaceRoot Always redacts Authorization, Cookie, X-API-Key, and common token patterns
Your skill creates an action object. Call this skill to evaluate it. If ALLOW โ execute sanitizedAction. If NEED_CONFIRMATION โ ask user and re-run with context.confirmed=true. If DENY โ stop and show the reasons.
policy.yaml contains the policy (edit for your environment).
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.