Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Scan repositories for risky security patterns before execution. Use when users ask for a quick preflight security check, policy enforcement scan, suspicious code triage, or detection of unsafe commands, secret leakage, and dangerous shell behavior.
Scan repositories for risky security patterns before execution. Use when users ask for a quick preflight security check, policy enforcement scan, suspicious code triage, or detection of unsafe commands, secret leakage, and dangerous shell behavior.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Run a lightweight policy scan to catch common high-risk patterns in code and scripts.
target_path (required): file or directory to scan. fail_on (optional): severity threshold for non-zero exit. One of critical, high, medium, low. json_output (optional): print raw JSON output.
Run scripts/policy_check.py on the target path. Review severity counts and top findings. If findings exist, prioritize critical and high items first. Suggest concrete fixes for each flagged pattern.
python3 scripts/policy_check.py "<target_path>" python3 scripts/policy_check.py "<target_path>" --json python3 scripts/policy_check.py "<target_path>" --fail-on high
Always include total findings and severity breakdown. Include top findings with file:line, rule id, and reason. If no findings exist, explicitly state that no policy violations were detected. Keep remediation guidance concrete and brief.
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.