Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Use when checking for security vulnerabilities in NanoClaw skills, before installing new skills, or when asked about security advisories affecting the bot
Use when checking for security vulnerabilities in NanoClaw skills, before installing new skills, or when asked about security advisories affecting the bot
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Security advisory monitoring that protects your WhatsApp bot from known vulnerabilities in skills and dependencies.
ClawSec provides MCP tools that check installed skills against a curated feed of security advisories. It prevents installation of vulnerable skills, includes exploitability context for triage, and alerts you to issues in existing ones. Core principle: Check before you install. Monitor what's running.
Use ClawSec tools when: Installing a new skill (check safety first) User asks "are my skills secure?" Investigating suspicious behavior Regular security audits After receiving security notifications Do NOT use for: Code review (use other tools) Performance issues (different concern) General debugging
// Before installing any skill const safety = await tools.clawsec_check_skill_safety({ skillName: 'new-skill', skillVersion: '1.0.0' // optional }); if (!safety.safe) { // Show user the risks before proceeding console.warn(`Security issues: ${safety.advisories.map(a => a.id)}`); }
// Check all installed skills (defaults to ~/.claude/skills in the container) const result = await tools.clawsec_check_advisories({ installRoot: '/home/node/.claude/skills' // optional }); if (result.matches.some((m) => m.advisory.severity === 'critical' || m.advisory.exploitability_score === 'high' )) { // Alert user immediately console.error('Urgent advisories found!'); }
// List advisories with filters const advisories = await tools.clawsec_list_advisories({ severity: 'high', // optional exploitabilityScore: 'high' // optional });
TaskToolKey ParameterPre-install checkclawsec_check_skill_safetyskillNameAudit all skillsclawsec_check_advisoriesinstallRoot (optional)Browse feedclawsec_list_advisoriesseverity, type, exploitabilityScore (optional)Verify package signatureclawsec_verify_skill_packagepackagePathRefresh advisory cacheclawsec_refresh_cache(none)Check file integrityclawsec_check_integritymode, autoRestore (optional)Approve file changeclawsec_approve_changepathView baseline statusclawsec_integrity_statuspath (optional)Verify audit logclawsec_verify_audit(none)
// ALWAYS check before installing const safety = await tools.clawsec_check_skill_safety({ skillName: userRequestedSkill }); if (safety.safe) { // Proceed with installation await installSkill(userRequestedSkill); } else { // Show user the risks and get confirmation await showSecurityWarning(safety.advisories); if (await getUserConfirmation()) { await installSkill(userRequestedSkill); } }
// Add to scheduled tasks schedule_task({ prompt: "Check advisories using clawsec_check_advisories and alert when critical or high-exploitability matches appear", schedule_type: "cron", schedule_value: "0 9 * * *" // Daily at 9am });
// DON'T await installSkill('untrusted-skill'); // DO const safety = await tools.clawsec_check_skill_safety({ skillName: 'untrusted-skill' }); if (safety.safe) await installSkill('untrusted-skill');
// DON'T: Use severity only if (advisory.severity === 'high') { notifyNow(advisory); } // DO: Use exploitability + severity if ( advisory.exploitability_score === 'high' || advisory.severity === 'critical' ) { notifyNow(advisory); }
// DON'T: Ignore high exploitability in medium severity advisories if (advisory.severity === 'critical') alert(); // DO: Prioritize exploitability and severity together if (advisory.exploitability_score === 'high' || advisory.severity === 'critical') { // Alert immediately }
Feed Source: https://clawsec.prompt.security/advisories/feed.json Update Frequency: Every 6 hours (automatic) Signature Verification: Ed25519 signed feeds Package Verification Policy: pinned key only, bounded package/signature paths Cache Location: /workspace/project/data/clawsec-advisory-cache.json See INSTALL.md for setup and docs/ for advanced usage.
Prevents installation of skills with known RCE vulnerabilities Alerts to supply chain attacks in dependencies Provides actionable remediation steps Zero false positives (curated feed only)
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.