Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Encrypt files, secure passwords, manage keys, and audit code for cryptographic best practices.
Encrypt files, secure passwords, manage keys, and audit code for cryptographic best practices.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Encrypting files, database fields, or app storage Password hashing (bcrypt, argon2) Key management, rotation, derivation TLS/certificate configuration Auditing code for crypto mistakes Mobile secure storage (Keychain, Keystore)
PurposeUseAvoidPasswordsargon2id, bcrypt (costโฅ12)MD5, SHA1, plain SHA256SymmetricAES-256-GCM, ChaCha20-Poly1305AES-ECB, DES, RC4AsymmetricRSA-4096+OAEP, Ed25519, P-256RSA-1024, PKCS#1 v1.5Key derivationPBKDF2 (โฅ600k), scrypt, argon2Single-pass hashJWT signingRS256, ES256HS256 with weak secretTLS1.2+ onlyTLS 1.0/1.1, SSLv3
Never reuse IVs/nonces โ AES-GCM + repeated nonce = catastrophic Use authenticated encryption (AEAD) โ Plain CBC enables padding oracles Hash passwords, don't encrypt โ Hashing is one-way No hardcoded keys โ Use env vars, KMS, or Vault No Math.random() for crypto โ Use CSPRNG only Constant-time comparisons โ Prevent timing attacks on secrets Separate keys by purpose โ Encryption โ signing โ backup
# age (modern, simple) age -p -o file.age file.txt age -d -o file.txt file.age # GPG gpg -c --cipher-algo AES256 file.txt
See patterns.md for code snippets: Password hashing (Node, Python, Go) Envelope encryption with KMS JWT with RS256 key rotation Secure token generation See mobile.md for: iOS Keychain wrapper Android EncryptedSharedPreferences SQLCipher setup Biometric auth integration Certificate pinning See infra.md for: TLS certificate auto-renewal HashiCorp Vault policies mTLS between services Backup encryption verification
No plaintext passwords in DB/logs/env No secrets in git history No hardcoded keys in source No Math.random() for security No deprecated algorithms (MD5, SHA1, DES) No disabled cert validation IVs/nonces never reused PBKDF2 iterations โฅ600k / bcrypt cost โฅ12 TLS 1.2+ enforced, old protocols disabled Key rotation procedure documented
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.