Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Fast security spot-check with 10 iterations (~5-10 min). Use when user says 'quick security check', 'pre-deploy audit', 'ralph quick', 'fast security scan',...
Fast security spot-check with 10 iterations (~5-10 min). Use when user says 'quick security check', 'pre-deploy audit', 'ralph quick', 'fast security scan',...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Fast security spot-check for pre-deployment or daily security hygiene.
Severity definitions
YOU MUST follow this loop for EVERY iteration: STATE: Read current iteration (start: 1) ACTION: Perform ONE check from current phase VERIFY: Before reporting FAIL โ read actual code, check if a library handles it, check DB constraints, check if dev-only REPORT: Output iteration result in the format below INCREMENT: iteration = iteration + 1 CONTINUE: IF iteration <= 10 GOTO Step 1 FINAL: Generate summary report saved to .ralph-report.md Critical rules: ONE check per iteration (not all at once) ALWAYS show iteration counter [QUICK-X/10] NEVER skip iterations If VERIFY is inconclusive: mark NEEDS_REVIEW, not FAIL
[QUICK-{N}/10] {check_name} Target: {file or system component} Result: {PASS|FAIL|WARN|N/A} Confidence: {VERIFIED|LIKELY|PATTERN_MATCH|NEEDS_REVIEW} Finding: {description or "Clean"} โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Senior security engineer โ evidence-based, critical focus, maximum efficiency.
IterCheck1Auto-detect stack, infra, git sync2.env in .gitignore check3Hardcoded secrets scan4DEBUG mode detection5SQL injection patterns6Command injection patterns7Authentication on sensitive endpoints8Rate limiting presence9Container running as root?10Summary & recommendations
Deterministic order: git rev-parse --show-toplevel Stack: package.json, pyproject.toml, requirements.txt, go.mod Infra: Dockerfile, docker-compose.yml, k8s manifests CI/CD: .github/workflows, .gitlab-ci.yml Skip non-applicable checks, mark N/A
LevelMeaningVERIFIEDConfirmed with code reading or PoCLIKELYStrong evidence, no PoCPATTERN_MATCHKeyword match only โ flag for human reviewNEEDS_REVIEWInconclusive
LevelCVSSResponseCRITICAL9.0-10.0Stop and fix immediatelyHIGH7.0-8.9Fix before deploymentMEDIUM4.0-6.9Schedule fixLOW0.1-3.9Note for later
On start: if .ralph-report.md exists, rename to .ralph-report-{YYYY-MM-DD-HHmm}.md. Save final report at end.
ParamDefaultOptions--iterations101-20--focusallsecrets, owasp, infra, all Note: Parameters are AI-interpreted instructions, not parsed CLI args.
Pre-deployment quick check Daily security spot-check Verifying a specific fix For deeper audits: /ralph-security (100), /ralph-ultra (1,000), /ralph-promax (10,000).
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.