{
  "schemaVersion": "1.0",
  "item": {
    "slug": "openclaw-warden",
    "name": "Openclaw Warden",
    "source": "tencent",
    "type": "skill",
    "category": "效率提升",
    "sourceUrl": "https://clawhub.ai/AtlasPA/openclaw-warden",
    "canonicalUrl": "https://clawhub.ai/AtlasPA/openclaw-warden",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/openclaw-warden",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=openclaw-warden",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "README.md",
      "scripts/integrity.py",
      "SKILL.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-30T16:55:25.780Z",
      "expiresAt": "2026-05-07T16:55:25.780Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
        "contentDisposition": "attachment; filename=\"network-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/openclaw-warden"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/openclaw-warden",
    "agentPageUrl": "https://openagent3.xyz/skills/openclaw-warden/agent",
    "manifestUrl": "https://openagent3.xyz/skills/openclaw-warden/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/openclaw-warden/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "OpenClaw Warden",
        "body": "Monitors your workspace files for unauthorized modifications and prompt injection attacks. Existing security tools scan skills before installation — this tool watches the workspace itself after installation, catching tampering that other tools miss."
      },
      {
        "title": "Why This Matters",
        "body": "Your agent reads SOUL.md, AGENTS.md, IDENTITY.md, USER.md, and memory files on every session startup and trusts them implicitly. A compromised skill, a malicious heartbeat payload, or an unauthorized process can modify these files to:\n\nInject hidden instructions that alter agent behavior\nEmbed data exfiltration URLs in markdown images\nOverride identity and safety boundaries\nPlant persistent backdoors in memory files\n\nThis skill detects all of these."
      },
      {
        "title": "Establish Baseline",
        "body": "Create or reset the integrity baseline. Run this after setting up your workspace or after reviewing and accepting all current file states.\n\npython3 {baseDir}/scripts/integrity.py baseline --workspace /path/to/workspace"
      },
      {
        "title": "Verify Integrity",
        "body": "Check all monitored files against the stored baseline. Reports modifications, deletions, and new untracked files.\n\npython3 {baseDir}/scripts/integrity.py verify --workspace /path/to/workspace"
      },
      {
        "title": "Scan for Injections",
        "body": "Scan workspace files for prompt injection patterns: hidden instructions, base64 payloads, Unicode tricks, markdown image exfiltration, HTML injection, and suspicious system prompt markers.\n\npython3 {baseDir}/scripts/integrity.py scan --workspace /path/to/workspace"
      },
      {
        "title": "Full Check (Verify + Scan)",
        "body": "Run both integrity verification and injection scanning in one pass.\n\npython3 {baseDir}/scripts/integrity.py full --workspace /path/to/workspace"
      },
      {
        "title": "Quick Status",
        "body": "One-line summary of workspace health.\n\npython3 {baseDir}/scripts/integrity.py status --workspace /path/to/workspace"
      },
      {
        "title": "Accept Changes",
        "body": "After reviewing a legitimate change, update the baseline for a specific file.\n\npython3 {baseDir}/scripts/integrity.py accept SOUL.md --workspace /path/to/workspace"
      },
      {
        "title": "Workspace Auto-Detection",
        "body": "If --workspace is omitted, the script tries:\n\nOPENCLAW_WORKSPACE environment variable\nCurrent directory (if AGENTS.md exists)\n~/.openclaw/workspace (default)"
      },
      {
        "title": "What Gets Monitored",
        "body": "CategoryFilesAlert Level on ChangeCriticalSOUL.md, AGENTS.md, IDENTITY.md, USER.md, TOOLS.md, HEARTBEAT.mdWARNINGMemorymemory/*.md, MEMORY.mdINFO (expected to change)Config*.json in workspace rootWARNINGSkillsskills/*/SKILL.mdWARNING\n\nInjection patterns trigger CRITICAL alerts regardless of file category."
      },
      {
        "title": "Injection Patterns Detected",
        "body": "Instruction override: \"ignore previous instructions\", \"disregard above\", \"you are now\", \"new system prompt\"\nBase64 payloads: Suspiciously long base64 strings outside code blocks\nUnicode manipulation: Zero-width characters, RTL overrides, homoglyphs\nMarkdown exfiltration: Image tags with data-encoding URLs\nHTML injection: script tags, iframes, hidden elements\nSystem prompt markers: <system>, [SYSTEM], <<SYS>> blocks\nShell injection: $(...) outside code blocks"
      },
      {
        "title": "Exit Codes",
        "body": "0 — Clean, no issues\n1 — Modifications detected (review needed)\n2 — Injection patterns detected (action needed)"
      },
      {
        "title": "No External Dependencies",
        "body": "Python standard library only. No pip install. No network calls. Everything runs locally."
      },
      {
        "title": "Cross-Platform",
        "body": "Works with OpenClaw, Claude Code, Cursor, and any tool using the Agent Skills specification."
      }
    ],
    "body": "OpenClaw Warden\n\nMonitors your workspace files for unauthorized modifications and prompt injection attacks. Existing security tools scan skills before installation — this tool watches the workspace itself after installation, catching tampering that other tools miss.\n\nWhy This Matters\n\nYour agent reads SOUL.md, AGENTS.md, IDENTITY.md, USER.md, and memory files on every session startup and trusts them implicitly. A compromised skill, a malicious heartbeat payload, or an unauthorized process can modify these files to:\n\nInject hidden instructions that alter agent behavior\nEmbed data exfiltration URLs in markdown images\nOverride identity and safety boundaries\nPlant persistent backdoors in memory files\n\nThis skill detects all of these.\n\nCommands\nEstablish Baseline\n\nCreate or reset the integrity baseline. Run this after setting up your workspace or after reviewing and accepting all current file states.\n\npython3 {baseDir}/scripts/integrity.py baseline --workspace /path/to/workspace\n\nVerify Integrity\n\nCheck all monitored files against the stored baseline. Reports modifications, deletions, and new untracked files.\n\npython3 {baseDir}/scripts/integrity.py verify --workspace /path/to/workspace\n\nScan for Injections\n\nScan workspace files for prompt injection patterns: hidden instructions, base64 payloads, Unicode tricks, markdown image exfiltration, HTML injection, and suspicious system prompt markers.\n\npython3 {baseDir}/scripts/integrity.py scan --workspace /path/to/workspace\n\nFull Check (Verify + Scan)\n\nRun both integrity verification and injection scanning in one pass.\n\npython3 {baseDir}/scripts/integrity.py full --workspace /path/to/workspace\n\nQuick Status\n\nOne-line summary of workspace health.\n\npython3 {baseDir}/scripts/integrity.py status --workspace /path/to/workspace\n\nAccept Changes\n\nAfter reviewing a legitimate change, update the baseline for a specific file.\n\npython3 {baseDir}/scripts/integrity.py accept SOUL.md --workspace /path/to/workspace\n\nWorkspace Auto-Detection\n\nIf --workspace is omitted, the script tries:\n\nOPENCLAW_WORKSPACE environment variable\nCurrent directory (if AGENTS.md exists)\n~/.openclaw/workspace (default)\nWhat Gets Monitored\nCategory\tFiles\tAlert Level on Change\nCritical\tSOUL.md, AGENTS.md, IDENTITY.md, USER.md, TOOLS.md, HEARTBEAT.md\tWARNING\nMemory\tmemory/*.md, MEMORY.md\tINFO (expected to change)\nConfig\t*.json in workspace root\tWARNING\nSkills\tskills/*/SKILL.md\tWARNING\n\nInjection patterns trigger CRITICAL alerts regardless of file category.\n\nInjection Patterns Detected\nInstruction override: \"ignore previous instructions\", \"disregard above\", \"you are now\", \"new system prompt\"\nBase64 payloads: Suspiciously long base64 strings outside code blocks\nUnicode manipulation: Zero-width characters, RTL overrides, homoglyphs\nMarkdown exfiltration: Image tags with data-encoding URLs\nHTML injection: script tags, iframes, hidden elements\nSystem prompt markers: <system>, [SYSTEM], <<SYS>> blocks\nShell injection: $(...) outside code blocks\nExit Codes\n0 — Clean, no issues\n1 — Modifications detected (review needed)\n2 — Injection patterns detected (action needed)\nNo External Dependencies\n\nPython standard library only. No pip install. No network calls. Everything runs locally.\n\nCross-Platform\n\nWorks with OpenClaw, Claude Code, Cursor, and any tool using the Agent Skills specification."
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/AtlasPA/openclaw-warden",
    "publisherUrl": "https://clawhub.ai/AtlasPA/openclaw-warden",
    "owner": "AtlasPA",
    "version": "1.0.3",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/openclaw-warden",
    "downloadUrl": "https://openagent3.xyz/downloads/openclaw-warden",
    "agentUrl": "https://openagent3.xyz/skills/openclaw-warden/agent",
    "manifestUrl": "https://openagent3.xyz/skills/openclaw-warden/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/openclaw-warden/agent.md"
  }
}