# Send Openclaw Bastion to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "openclaw-bastion",
    "name": "Openclaw Bastion",
    "source": "tencent",
    "type": "skill",
    "category": "效率提升",
    "sourceUrl": "https://clawhub.ai/AtlasPA/openclaw-bastion",
    "canonicalUrl": "https://clawhub.ai/AtlasPA/openclaw-bastion",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/openclaw-bastion",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=openclaw-bastion",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "README.md",
      "scripts/bastion.py",
      "SKILL.md"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-30T16:55:25.780Z",
      "expiresAt": "2026-05-07T16:55:25.780Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
        "contentDisposition": "attachment; filename=\"network-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/openclaw-bastion"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/openclaw-bastion",
    "downloadUrl": "https://openagent3.xyz/downloads/openclaw-bastion",
    "agentUrl": "https://openagent3.xyz/skills/openclaw-bastion/agent",
    "manifestUrl": "https://openagent3.xyz/skills/openclaw-bastion/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/openclaw-bastion/agent.md"
  }
}
```
## Documentation

### OpenClaw Bastion

Runtime prompt injection defense for agent workspaces. While other tools watch workspace identity files, Bastion protects the input/output boundary — the files being read by the agent, web content, API responses, and user-supplied documents.

### Why This Matters

Agents process content from many sources: local files, API responses, web pages, user uploads. Any of these can contain prompt injection attacks — hidden instructions that manipulate agent behavior. Bastion scans this content before the agent acts on it.

### Scan for Injections

Scan files or directories for prompt injection patterns. Detects instruction overrides, system prompt markers, hidden Unicode, markdown exfiltration, HTML injection, shell injection, encoded payloads, delimiter confusion, multi-turn manipulation, and dangerous commands.

If no target is specified, scans the entire workspace.

python3 {baseDir}/scripts/bastion.py scan

Scan a specific file or directory:

python3 {baseDir}/scripts/bastion.py scan path/to/file.md
python3 {baseDir}/scripts/bastion.py scan path/to/directory/

### Quick File Check

Fast single-file injection check. Same detection patterns as scan, targeted to one file.

python3 {baseDir}/scripts/bastion.py check path/to/file.md

### Boundary Analysis

Analyze content boundary safety across the workspace. Identifies:

Agent instruction files that contain mixed trusted/untrusted content
Writable instruction files (attack surface for compromised skills)
Blast radius assessment for each critical file

python3 {baseDir}/scripts/bastion.py boundaries

### Command Allowlist

Display the current command allowlist and blocklist policy. Creates a default .bastion-policy.json if none exists.

python3 {baseDir}/scripts/bastion.py allowlist
python3 {baseDir}/scripts/bastion.py allowlist --show

The policy file defines which commands are considered safe and which patterns are blocked. Edit the JSON file directly to customize. Bastion Pro enforces this policy at runtime via hooks.

### Status

Quick summary of workspace injection defense posture: files scanned, findings by severity, boundary safety, and overall posture rating.

python3 {baseDir}/scripts/bastion.py status

### Workspace Auto-Detection

If --workspace is omitted, the script tries:

OPENCLAW_WORKSPACE environment variable
Current directory (if AGENTS.md exists)
~/.openclaw/workspace (default)

### What Gets Detected

CategoryPatternsSeverityInstruction override"ignore previous", "disregard above", "you are now", "new system prompt", "forget your instructions", "override safety", "act as if no restrictions", "entering developer mode"CRITICALSystem prompt markers<system>, [SYSTEM], <<SYS>>, <|im_start|>system, [INST], ### System:CRITICALHidden instructionsMulti-turn manipulation ("in your next response, you must"), stealth patterns ("do not tell the user")CRITICALHTML injection<script>, <iframe>, <img onerror=>, hidden divs, <svg onload=>CRITICALMarkdown exfiltrationImage tags with encoded data in URLsCRITICALDangerous commandscurl | bash, wget | sh, rm -rf /, fork bombsCRITICALUnicode tricksZero-width characters, RTL overrides, invisible formattingWARNINGHomoglyph substitutionCyrillic/Latin lookalikes mixed into ASCII textWARNINGBase64 payloadsLarge encoded blobs outside code blocksWARNINGShell injection$(command) subshell execution outside code blocksWARNINGDelimiter confusionFake code block boundaries with injection contentWARNING

### Context-Aware Scanning

Patterns inside fenced code blocks (\`\`\`) are skipped to avoid false positives
Per-file risk scoring based on finding count and severity
Self-exclusion: Bastion skips its own skill files (which describe injection patterns)

### Exit Codes

CodeMeaning0Clean, no issues1Warnings detected (review recommended)2Critical findings (action needed)

### No External Dependencies

Python standard library only. No pip install. No network calls. Everything runs locally.

### Cross-Platform

Works with OpenClaw, Claude Code, Cursor, and any tool using the Agent Skills specification.
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: AtlasPA
- Version: 1.0.2
## Source health
- Status: healthy
- Source download looks usable.
- Yavira can redirect you to the upstream package for this source.
- Health scope: source
- Reason: direct_download_ok
- Checked at: 2026-04-30T16:55:25.780Z
- Expires at: 2026-05-07T16:55:25.780Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/openclaw-bastion)
- [Send to Agent page](https://openagent3.xyz/skills/openclaw-bastion/agent)
- [JSON manifest](https://openagent3.xyz/skills/openclaw-bastion/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/openclaw-bastion/agent.md)
- [Download page](https://openagent3.xyz/downloads/openclaw-bastion)