Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Run a comprehensive local security scan on your OpenClaw installation. Checks config, network exposure, credentials, OS hardening, and agent guardrails. Scor...
Run a comprehensive local security scan on your OpenClaw installation. Checks config, network exposure, credentials, OS hardening, and agent guardrails. Scor...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Run a local security assessment on any OpenClaw installation.
The skill provides a bash script that scans your OpenClaw setup and reports findings with severity levels.
bash "$(dirname "$0")/oc-security-scan.sh"
bash "$(dirname "$0")/oc-security-scan.sh" --fix
bash "$(dirname "$0")/oc-security-scan.sh" --report
bash "$(dirname "$0")/oc-security-scan.sh" --json
OpenClaw Configuration โ bind address, token strength, config permissions, exec security mode Network Exposure โ listening ports, firewall status, public interface exposure Credential Hygiene โ plaintext secrets, file permissions, .gitignore patterns OS Hardening โ disk encryption, auto-updates, OS version, root usage Agent Guardrails โ RULES.md, memory file permissions, safety constraints
Color-coded terminal output with severity levels: ๐ด CRITICAL โ immediate action required ๐ก WARNING โ should be addressed ๐ข PASS โ looks good โช INFO โ informational Ends with a security score out of 100 (A-F grade).
Local only โ zero external network calls, nothing phones home Read-only by default โ only modifies files when --fix is explicitly passed Owner-operated โ designed to be run by the OpenClaw owner on their own machine No dependencies โ standard unix tools + openclaw CLI only
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.