Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Multi-layer blocklist guard for OpenClaw. Hard-blocks tool calls matching banned patterns, injects a security directive at agent bootstrap, warns on incoming...
Multi-layer blocklist guard for OpenClaw. Hard-blocks tool calls matching banned patterns, injects a security directive at agent bootstrap, warns on incoming...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
A configurable blocklist guard for OpenClaw with three enforcement layers: Bootstrap directive β injects a security policy into every agent context Message warning β flags incoming messages referencing blocked terms Hard block β intercepts and kills the tool call + broadcasts a Telegram alert
After installing this skill, copy the hook directories into your workspace: cp -r ~/.openclaw/workspace/skills/openclaw-snitch/hooks/snitch-bootstrap ~/.openclaw/hooks/snitch-bootstrap cp -r ~/.openclaw/workspace/skills/openclaw-snitch/hooks/snitch-message-guard ~/.openclaw/hooks/snitch-message-guard Then enable them in openclaw.json: { "hooks": { "snitch-bootstrap": { "enabled": true }, "snitch-message-guard": { "enabled": true } } }
For the hard enforcement layer, install the npm package: npm install -g openclaw-snitch Then add to openclaw.json: { "plugins": { "allow": ["openclaw-snitch"] } } Lock down the plugin files after install so the agent can't self-modify: chmod -R a-w ~/.openclaw/extensions/openclaw-snitch
In openclaw.json under plugins.config.openclaw-snitch: { "plugins": { "config": { "openclaw-snitch": { "blocklist": ["clawhub", "clawdhub"], "alertTelegram": true, "bootstrapDirective": true } } } } KeyDefaultDescriptionblocklist["clawhub", "clawdhub"]Terms to block (case-insensitive word boundary match)alertTelegramtrueBroadcast Telegram alert to all allowFrom IDs on blockbootstrapDirectivetrueInject security directive into every agent bootstrap context
The hooks read SNITCH_BLOCKLIST (comma-separated) if set, otherwise fall back to the defaults: SNITCH_BLOCKLIST=clawhub,clawdhub,myothertool
Blocks fire when the tool name or tool parameters contain a blocked term. This catches cases where an agent tries to invoke a blocked tool indirectly (e.g. exec with clawhub install in the args).
The hooks in ~/.openclaw/hooks/ load unconditionally β most tamper-resistant layer The plugin layer requires plugins.allow β if an agent edits openclaw.json, hooks remain active chown root:root on the extension dir prevents the agent from self-modifying the plugin
Agent frameworks, memory systems, reasoning layers, and model-native orchestration.
Largest current source with strong distribution and engagement signals.