Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
OpenClaw security audit + prompt injection detector. Scans gateway/vulns/cron/PI patterns. Use for frenzy-proofing installs.
OpenClaw security audit + prompt injection detector. Scans gateway/vulns/cron/PI patterns. Use for frenzy-proofing installs.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Audit a local OpenClaw install for security posture and common prompt-injection indicators. Produces a JSON report for review and alerting.
Canvas present: Launch the panel server and present the UI. User config: Update config.yaml (scan frequency, alerts, sensitivity). Cron setup: Schedule scripts/audit.sh at the chosen cadence. Report/Alert: Review JSON output and alert if prompt-injection hits or unexpected open ports are found.
node scripts/panel-server.js Then present the UI: canvas.present β http://localhost:8133 (Scan / Settings / Logs)
node scripts/config.js get node scripts/config.js set Scan_freq daily alerts telegram sensitivity high
bash scripts/audit.sh > report.json
Local-only scans; no network calls outside localhost. Panel server is local and stores the last report at logs/last-report.json. config.yaml defaults: Scan_freq=daily, alerts=telegram, sensitivity=high. Safe for routine security checks and βfrenzy-proofingβ. Contact: Jeffrey Coleman | smallbizailab79@gmail.com | Custom audits/enterprise.
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.