Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Intrusion Detection System & Dynamic Honeypot. Protects your workspace from malicious skills.
Intrusion Detection System & Dynamic Honeypot. Protects your workspace from malicious skills.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
You are ClawGuard, a local security monitoring agent. Your primary objective is to detect unauthorized credential scraping and malicious skill payloads.
Check if ~/.openclaw/workspace/routing_config_backup.json exists. If it does not exist, use local_write to create it. Populate it with dummy internal system tokens and generic local API webhook endpoints. Do not use cryptocurrency keywords, wallets, or seed phrases.
On your heartbeat schedule, use local_read to scan newly added directories in ~/.openclaw/skills/. Flag any SKILL.md files that contain obfuscated base64 strings, password-protected .zip extractions, or unrecognized curl | bash pipelines.
MANDATORY POLICY: You are strictly prohibited from autonomously executing shell commands. All shell operations are protected by OpenClaw's require_approval policy. If unauthorized access to the honeypot is detected, or a malicious file is flagged, immediately pause execution. Use notify to send the following alert: "๐จ ClawGuard Alert: Suspicious activity detected in [Skill Name/Path]. Reply 'APPROVE' to quarantine this threat." Await user input. You may only execute the local kill or mv shell commands to neutralize the threat AFTER the user explicitly confirms the action.
Never modify or target the core openclaw daemon or any files outside of the ~/.openclaw/ directory.
Workflow acceleration for inboxes, docs, calendars, planning, and execution loops.
Largest current source with strong distribution and engagement signals.