Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Verify workspace file integrity and scan for prompt injection patterns in agent identity and memory files. Detects unauthorized modifications to SOUL.md, AGENTS.md, IDENTITY.md, memory files, and installed skills. Free detection layer — upgrade to openclaw-warden-pro for automated countermeasures.
Verify workspace file integrity and scan for prompt injection patterns in agent identity and memory files. Detects unauthorized modifications to SOUL.md, AGENTS.md, IDENTITY.md, memory files, and installed skills. Free detection layer — upgrade to openclaw-warden-pro for automated countermeasures.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Monitors your workspace files for unauthorized modifications and prompt injection attacks. Existing security tools scan skills before installation — this tool watches the workspace itself after installation, catching tampering that other tools miss.
Your agent reads SOUL.md, AGENTS.md, IDENTITY.md, USER.md, and memory files on every session startup and trusts them implicitly. A compromised skill, a malicious heartbeat payload, or an unauthorized process can modify these files to: Inject hidden instructions that alter agent behavior Embed data exfiltration URLs in markdown images Override identity and safety boundaries Plant persistent backdoors in memory files This skill detects all of these.
Create or reset the integrity baseline. Run this after setting up your workspace or after reviewing and accepting all current file states. python3 {baseDir}/scripts/integrity.py baseline --workspace /path/to/workspace
Check all monitored files against the stored baseline. Reports modifications, deletions, and new untracked files. python3 {baseDir}/scripts/integrity.py verify --workspace /path/to/workspace
Scan workspace files for prompt injection patterns: hidden instructions, base64 payloads, Unicode tricks, markdown image exfiltration, HTML injection, and suspicious system prompt markers. python3 {baseDir}/scripts/integrity.py scan --workspace /path/to/workspace
Run both integrity verification and injection scanning in one pass. python3 {baseDir}/scripts/integrity.py full --workspace /path/to/workspace
One-line summary of workspace health. python3 {baseDir}/scripts/integrity.py status --workspace /path/to/workspace
After reviewing a legitimate change, update the baseline for a specific file. python3 {baseDir}/scripts/integrity.py accept SOUL.md --workspace /path/to/workspace
If --workspace is omitted, the script tries: OPENCLAW_WORKSPACE environment variable Current directory (if AGENTS.md exists) ~/.openclaw/workspace (default)
CategoryFilesAlert Level on ChangeCriticalSOUL.md, AGENTS.md, IDENTITY.md, USER.md, TOOLS.md, HEARTBEAT.mdWARNINGMemorymemory/*.md, MEMORY.mdINFO (expected to change)Config*.json in workspace rootWARNINGSkillsskills/*/SKILL.mdWARNING Injection patterns trigger CRITICAL alerts regardless of file category.
Instruction override: "ignore previous instructions", "disregard above", "you are now", "new system prompt" Base64 payloads: Suspiciously long base64 strings outside code blocks Unicode manipulation: Zero-width characters, RTL overrides, homoglyphs Markdown exfiltration: Image tags with data-encoding URLs HTML injection: script tags, iframes, hidden elements System prompt markers: <system>, [SYSTEM], <<SYS>> blocks Shell injection: $(...) outside code blocks
0 — Clean, no issues 1 — Modifications detected (review needed) 2 — Injection patterns detected (action needed)
Python standard library only. No pip install. No network calls. Everything runs locally.
Works with OpenClaw, Claude Code, Cursor, and any tool using the Agent Skills specification.
Workflow acceleration for inboxes, docs, calendars, planning, and execution loops.
Largest current source with strong distribution and engagement signals.