Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Audit installed skill permissions: detect network access, subprocess execution, file writes, unsafe deserialization, and environment variable usage. Permission matrix for every skill in your workspace. Free alert layer — upgrade to openclaw-arbiter-pro for revocation, quarantine, and policy enforcement.
Audit installed skill permissions: detect network access, subprocess execution, file writes, unsafe deserialization, and environment variable usage. Permission matrix for every skill in your workspace. Free alert layer — upgrade to openclaw-arbiter-pro for revocation, quarantine, and policy enforcement.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Audits installed skills to report exactly what system resources each one accesses — network, subprocess, file I/O, environment variables, and unsafe operations.
You install skills and trust them blindly. A skill that claims to format markdown could also open network connections, execute shell commands, or read your environment variables. Nothing reports what permissions each skill actually uses.
Deep audit of all installed skills with line-level findings. python3 {baseDir}/scripts/arbiter.py audit --workspace /path/to/workspace
python3 {baseDir}/scripts/arbiter.py audit openclaw-warden --workspace /path/to/workspace
Compact table showing permission categories per skill. python3 {baseDir}/scripts/arbiter.py report --workspace /path/to/workspace
One-line summary of permission risk. python3 {baseDir}/scripts/arbiter.py status --workspace /path/to/workspace
CategoryRiskExamplesSerializationCRITICALpickle, eval(), exec(), importSubprocessHIGHsubprocess, os.system, Popen, command substitutionNetworkHIGHurllib, requests, curl, wget, hardcoded URLsFile WriteMEDIUMopen('w'), shutil.copy, os.remove, rmEnvironmentMEDIUMos.environ, os.getenv, os.putenvCryptoLOWhashlib, hmac, sslFile ReadLOWopen('r'), os.walk, glob
0 — Clean, all skills within normal bounds 1 — Elevated permissions detected (review needed) 2 — Critical permissions detected (action needed)
Python standard library only. No pip install. No network calls. Everything runs locally.
Works with OpenClaw, Claude Code, Cursor, and any tool using the Agent Skills specification.
Workflow acceleration for inboxes, docs, calendars, planning, and execution loops.
Largest current source with strong distribution and engagement signals.