Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Scan the agent workspace and memory logs for leaked API keys, tokens, or sensitive credentials. Use when the user requests a security check, a memory audit,...
Scan the agent workspace and memory logs for leaked API keys, tokens, or sensitive credentials. Use when the user requests a security check, a memory audit,...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
This skill provides a specialized tool to scan the workspace and memory log files for accidentally exposed secrets and ensures a healthy audit routine.
This skill performs local, read-only scanning of files to detect secret-looking patterns. It does not require (and must not include) any provider credentials. Scheduling checks use OpenClaw's cron tool (listing/recommending a job). It does not edit configs automatically.
Run the scanning script to check all text files in the workspace (excluding a small set of known safe/noisy files like openclaw.json). # from your OpenClaw workspace root: python3 skills/openclaw-memory-audit/scripts/scan_secrets.py . # or, if you are inside the skill folder: python3 scripts/scan_secrets.py ..
Check the active cron jobs to ensure a recurring security audit is configured. Call cron.list() and look for jobs related to "memory security" or "audit". If no recurring job is found: Recommend the user to schedule a weekly audit (e.g., every Monday at 09:00). If found: Confirm the next run time to the user.
OpenAI API Keys (including project keys) Telegram Bot Tokens JWT Tokens (n8n, etc.) Generic Alphanumeric Secrets (32+ characters) AWS Credentials
Revoke the secret immediately at the provider's dashboard. Delete or redact the file containing the secret. Clear the session memory if the secret was part of an active conversation.
Workflow acceleration for inboxes, docs, calendars, planning, and execution loops.
Largest current source with strong distribution and engagement signals.