Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Deep behavioral audit with hashed policy (CSP-compliant, no plaintext badwords)
Deep behavioral audit with hashed policy (CSP-compliant, no plaintext badwords)
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Deep behavioral page auditing with content safety policy enforcement.
๐ Browser automation with redirect tracking ๐ก๏ธ Content policy checking (hashed badwords) ๐ฏ Response monitoring (SSRF/XXE detection) ๐ธ Full-page screenshots ๐ HAR export ๐จ WeCom alerts for critical findings
Set required environment variables: export WECOM_WEBHOOK_URL="https://qyapi.weixin.qq.com/cgi-bin/webhook/send?key=YOUR_KEY" export OPENCLAW_AUDIT_DIR="${HOME}/.openclaw/audit" # optional
curl -X POST http://localhost:8080/api/audit/scan \ -H "Content-Type: application/json" \ -d '{"url": "https://example.com", "include_har": true}'
openclaw skill run page-behavior-audit --url https://example.com
Input schema: url (string, required): Target URL to audit include_har (boolean, optional): Export HAR file (default: true) Output: redirects: Captured redirects text_alerts: Content policy violations ct_alerts: Response monitoring alerts screenshot_path: Screenshot file path har_path: HAR file path
SHA256-hashed badword policies Ed25519 signature verification CSP-compliant (no plaintext sensitive words) Sandbox-isolated browser execution
CRITICAL severity: XML served from non-.xml endpoints (SSRF/XXE risk) Image endpoints returning XML (XXE evasion) Alerts are sent to WeCom webhook when critical issues are detected.
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.