Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Harden OpenClaw (workspace + ~/.openclaw): run openclaw security audit, catch prompt-injection/exfil risks, scan for secrets, and apply safe fixes (chmod/exec-bit cleanup). Includes optional config.patch planning to reduce attack surface.
Harden OpenClaw (workspace + ~/.openclaw): run openclaw security audit, catch prompt-injection/exfil risks, scan for secrets, and apply safe fixes (chmod/exec-bit cleanup). Includes optional config.patch planning to reduce attack surface.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
This skill provides a user-choice hardening tool that can: Run OpenClawβs built-in security audit (openclaw security audit --deep / --fix). Run workspace hygiene checks (exec bits, stray .env, unsafe serialization patterns, etc.). Apply safe mechanical fixes only when explicitly requested. Generate (and optionally apply) a Gateway config.patch plan to tighten runtime policy.
Script: skills_live/openclaw-hardener/scripts/hardener.py Examples: # Read-only checks (recommended default) python3 skills_live/openclaw-hardener/scripts/hardener.py check --all # Only run OpenClaw built-in audit (deep) python3 skills_live/openclaw-hardener/scripts/hardener.py check --openclaw # Only run workspace checks python3 skills_live/openclaw-hardener/scripts/hardener.py check --workspace # Apply safe fixes (chmod/exec-bit cleanup + optionally openclaw audit --fix) python3 skills_live/openclaw-hardener/scripts/hardener.py fix --all # Generate a config.patch plan (prints JSON5 patch) python3 skills_live/openclaw-hardener/scripts/hardener.py plan-config # Apply the plan (requires a running gateway; uses `openclaw gateway call`) python3 skills_live/openclaw-hardener/scripts/hardener.py apply-config
Default = check-only. No file/config changes unless user runs fix or apply-config. No secrets in output. If a check reads sensitive paths, it must redact likely tokens. Patch plans must be explicit. Always show the patch before applying.
Runs openclaw security audit --deep (and --fix in fix mode).
Permissions sanity under ~/.openclaw (basic checks). Unexpected executable bits in non-executable filetypes. Stray .env files (warn) and tracked .env (fail). Risky deserialization / unsafe patterns in our scripts (heuristics).
Generates a conservative config.patch template focusing on: Tightening inbound access defaults (pairing/allowlist, mention gating) only if you opt-in. Ensuring sensitive log redaction is enabled. (Exact keys depend on your config; the plan is best-effort and should be reviewed.)
Workflow acceleration for inboxes, docs, calendars, planning, and execution loops.
Largest current source with strong distribution and engagement signals.