Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Enterprise AI security scanner using static analysis, runtime guards, and ClamAV to detect credential theft, data leaks, malware, and ensure audit logging.
Enterprise AI security scanner using static analysis, runtime guards, and ClamAV to detect credential theft, data leaks, malware, and ensure audit logging.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Enterprise security scanner for AI agents. Detects credential theft, data exfiltration, and malicious code with static analysis + runtime guards + ClamAV integration. Audit logging and tamper-evident reports. When to use: Security scanning, threat detection, code auditing, runtime protection for AI agents What to know: Repository: https://github.com/pfaria32/OpenClaw-Shield-Security
Detects credential theft, data exfiltration, destructive operations Pattern-based analysis (no external dependencies) Python stdlib only (zero supply chain risk) Pre-execution scanning
File/network/exec allowlists Output sanitization Policy enforcement Real-time protection
ClamAV integration (3.6M virus signatures) Telegram alerting on critical findings Hash-chained audit logging Tamper-evident security logs
cd /home/node/.openclaw/workspace git clone https://github.com/pfaria32/OpenClaw-Shield-Security.git projects/OpenClaw-Shield # Test the scanner python3 projects/OpenClaw-Shield/src/scanner.py /path/to/scan # Deploy (see repository README for full setup)
python3 projects/OpenClaw-Shield/src/scanner.py workspace --output shield-report.json
Set up cron job (see repository deployment guide): # Daily at 3 AM UTC 0 3 * * * /path/to/scan-script.sh
Configure allowlists and enable runtime protection (see deployment/openclaw-config.py in repo).
โ Deployed on this instance (clawdbot-toronto) Daily scans: 3:00 AM UTC ClamAV: Active (host-level) Runtime guard: Prepared (not enabled by default)
Inspired by: Resonant by Manolo Remiddi Source: https://github.com/ManoloRemiddi/resonantos-open-system-toolkit/blob/main/BUILD_YOUR_OWN_SHIELD.md Built on the principle: "Don't trust, verify."
Full docs, threat model, and deployment guide in repository README.
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.