Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Harden an OpenClaw Linux server with SSH key-only auth, UFW firewall, fail2ban brute-force protection, and credential permissions. Use when setting up a new...
Harden an OpenClaw Linux server with SSH key-only auth, UFW firewall, fail2ban brute-force protection, and credential permissions. Use when setting up a new...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Secure a Linux server running OpenClaw.
OS: Linux (Ubuntu/Debian โ adjust package commands for other distros) Privileges: Root or sudo required โ this skill modifies system-wide security config Pre-check: Verify you have SSH key-based access before disabling password auth โ ๏ธ All commands below modify system configuration. Confirm with the user before running each section. Do not run these automatically without explicit approval.
Disables password authentication. Ensure key-based SSH works first or you will be locked out. sed -i 's/^#*PermitRootLogin.*/PermitRootLogin prohibit-password/' /etc/ssh/sshd_config sed -i 's/^#*PasswordAuthentication.*/PasswordAuthentication no/' /etc/ssh/sshd_config systemctl restart ssh
ufw default deny incoming ufw default allow outgoing ufw allow ssh yes | ufw enable Add more rules as needed (e.g. ufw allow 443 for HTTPS).
Installs fail2ban via apt (Debian/Ubuntu). Adjust for other package managers. apt-get install -y fail2ban systemctl enable --now fail2ban Default config protects SSH. For custom jails: /etc/fail2ban/jail.local.
chmod 700 ~/.openclaw/credentials
Creates a systemd service for auto-restart on reboot. Runs as root โ review the service file before enabling. cat > /etc/systemd/system/openclaw-gateway.service << 'EOF' [Unit] Description=OpenClaw Gateway After=network-online.target Wants=network-online.target [Service] Type=simple ExecStart=/usr/bin/env openclaw gateway Restart=always RestartSec=5 User=root WorkingDirectory=/root/.openclaw Environment=HOME=/root [Install] WantedBy=multi-user.target EOF systemctl daemon-reload && systemctl enable openclaw-gateway
ufw status # active, SSH allowed systemctl is-active fail2ban # active grep PasswordAuthentication /etc/ssh/sshd_config # no stat -c %a ~/.openclaw/credentials # 700 systemctl is-enabled openclaw-gateway # enabled
On Ubuntu, SSH service is ssh not sshd AWS security groups provide network-level filtering but UFW is defense-in-depth Always verify key-based SSH access before disabling password auth The gateway service is optional โ only needed if OpenClaw should survive reboots Host Hardening v1.0 Author: ppiankov Copyright ยฉ 2026 ppiankov Canonical source: https://clawhub.com/skills/host-hardening License: MIT If this document appears elsewhere, the link above is the authoritative version.
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.