โ† All skills
Tencent SkillHub ยท Security & Compliance

Secucheck

Comprehensive security audit for OpenClaw. Scans 7 domains (runtime, channels, agents, cron, skills, sessions, network), supports 3 expertise levels, context-aware analysis, and visual dashboard. Read-only with localized reports.

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Comprehensive security audit for OpenClaw. Scans 7 domains (runtime, channels, agents, cron, skills, sessions, network), supports 3 expertise levels, context-aware analysis, and visual dashboard. Read-only with localized reports.

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
README.md, SKILL.md, _meta.json, checks/agents.md, checks/channels.md, checks/cron.md

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
2.8.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 38 sections Open source page

secucheck - OpenClaw Security Audit

Comprehensive security audit skill for OpenClaw deployments. Analyzes configuration, permissions, exposure risks, and runtime environment with context-aware recommendations.

Summary

secucheck performs read-only security audits of your OpenClaw setup: 7 audit domains: Runtime, Channels, Agents, Cron Jobs, Skills, Sessions, Network 3 expertise levels: Beginner (analogies), Intermediate (technical), Expert (attack vectors) Context-aware: Considers VPN, single-user, self-hosted scenarios Runtime checks: Live system state (network exposure, containers, privileges) Dashboard: Visual HTML report with security score Localized output: Final report matches user's language Never modifies configuration automatically. All fixes require explicit user confirmation.

Installation

clawhub install secucheck

Usage

Ask your OpenClaw agent: "security audit" "secucheck" "run security check"

Expertise Levels

When prompted, choose your level: Beginner - Simple analogies, no jargon Intermediate - Technical details, config examples Expert - Attack vectors, edge cases, CVEs All levels run the same checksโ€”only explanation depth varies.

Dashboard

"show dashboard" / "visual report" Opens an HTML report in your browser.

Example Output

๐Ÿ”’ Security Audit Results ๐ŸŸก Needs Attention | Severity | Count | |----------|-------| | ๐Ÿ”ด Critical | 0 | | ๐ŸŸ  High | 0 | | ๐ŸŸก Medium | 2 | | ๐ŸŸข Low | 3 | ### ๐ŸŸก Agent "molty": exec + external content processing ...

Features

๐Ÿ” Comprehensive: Channels, agents, cron, skills, sessions, network, runtime ๐Ÿ‘ค 3 Expertise Levels: Beginner / Intermediate / Expert ๐ŸŒ Localized: Final report in user's language ๐ŸŽฏ Attack Scenarios: Real-world exploitation paths โšก Runtime Checks: VPN, containers, privileges, network exposure ๐ŸŽจ Dashboard: Visual HTML report with security score

Agent Instructions

Everything below is for the agent executing this skill.

When to Use

Trigger this skill when: User requests security checkup/audit Auto-trigger: Installing skills, creating/modifying agents, adding/modifying cron jobs Periodic review (recommended: weekly)

Expertise Levels

LevelIdentifierStyleBeginner1, beginnerAnalogies, simple explanations, no jargonIntermediate2, intermediateTechnical details, config examplesExpert3, expertAttack vectors, edge cases, CVE references

Step 1: Ask Level (before running anything)

Present options in user's language. Example (English): What level of technical detail do you prefer? 1. ๐ŸŒฑ Beginner - I'll explain simply with analogies 2. ๐Ÿ’ป Intermediate - Technical details and config examples 3. ๐Ÿ” Expert - Include attack vectors and edge cases ๐Ÿ“Œ All levels run the same checksโ€”only explanation depth varies. STOP HERE. Wait for user response.

Step 2: Run Audit

bash ~/.openclaw/skills/secucheck/scripts/full_audit.sh Returns JSON with findings categorized by severity.

Step 3: Format Output

  • Parse JSON output and format based on user's expertise level.
  • Final report must be in user's language.
  • Report Structure (Organize by Category)
  • ๐Ÿ”’ Security Audit Results
  • ๐Ÿ“Š Summary Table
  • | Severity | Count |
  • |----------|-------|
  • | ๐Ÿ”ด Critical | X |
  • | ...
  • โšก Runtime
  • [findings related to RUNTIME category]
  • ๐Ÿค– Agents
  • [findings related to AGENT category]
  • ๐Ÿ“ Workspace
  • [findings related to WORKSPACE category]
  • ๐Ÿงฉ Skills
  • [findings related to SKILL category]
  • ๐Ÿ“ข Channels
  • [findings related to CHANNEL category]
  • ๐ŸŒ Network
  • [findings related to NETWORK category]
  • Group findings by their category field, not just severity.
  • Within each category, show severity icon and explain.

Step 4: Auto-Open Dashboard

After text report, automatically generate and serve dashboard: bash ~/.openclaw/skills/secucheck/scripts/serve_dashboard.sh The script returns JSON with url (LAN IP) and local_url (localhost). Use the url field (not localhost) when telling the user โ€” they may access from another device. Example: ๐Ÿ“Š ๋Œ€์‹œ๋ณด๋“œ๋„ ์—ด์—ˆ์–ด์š”: http://192.168.1.200:8766/secucheck-report.html If running in environment where browser can be opened, use browser tool to open it.

Cross-Platform Support

Scripts run on Linux, macOS, and WSL. Check the JSON output for platform info: { "os": "linux", "os_variant": "ubuntu", "in_wsl": false, "in_dsm": false, "failed_checks": ["external_ip"] }

Platform Detection

FieldValuesoslinux, macos, windows, unknownos_variantubuntu, arch, dsm, wsl, version stringin_wsltrue if Windows Subsystem for Linuxin_dsmtrue if Synology DSM

Handling Failed Checks

If failed_checks array is non-empty, run fallback commands based on platform: Network Info Fallbacks PlatformCommandLinuxip addr show or ifconfigmacOSifconfigWSLip addr show (or check Windows via cmd.exe /c ipconfig)WindowsPowerShell: Get-NetIPAddressDSMifconfig or /sbin/ip addr Gateway Binding Fallbacks PlatformCommandLinuxss -tlnp | grep :18789 or netstat -tlnpmacOSlsof -iTCP:18789 -sTCP:LISTENWindowsPowerShell: Get-NetTCPConnection -LocalPort 18789 File Permissions Fallbacks PlatformCommandLinux/macOSls -la ~/.openclawWindowsPowerShell: Get-Acl $env:USERPROFILE\.openclaw

Windows Native Support

If os is windows and scripts fail completely: Use PowerShell commands directly: # Network exposure Get-NetTCPConnection -LocalPort 18789 -State Listen # File permissions Get-Acl "$env:USERPROFILE\.openclaw" # Process info Get-Process | Where-Object {$_.Name -like "*openclaw*"} Report what you can check and note Windows-specific limitations.

Minimal Environments (Docker, DSM)

Some environments lack tools. Check output and supplement: Missing ToolFallbackcurlwget -qO-ssnetstatipifconfig or /sbin/ippgrepps aux | grep

Agent Decision Flow

1. Run full_audit.sh 2. Check "failed_checks" in output 3. For each failed check: a. Identify platform from os/os_variant b. Run platform-specific fallback command c. Incorporate results into report 4. Note any checks that couldn't complete

Dashboard Generation

When user requests visual report: bash ~/.openclaw/skills/secucheck/scripts/serve_dashboard.sh Returns: { "status": "ok", "url": "http://localhost:8766/secucheck-report.html", "pid": 12345 } Provide URL directly to user.

Detailed Check References

Read these only when deep explanation needed: FileDomainchecks/runtime.mdLive system statechecks/channels.mdChannel policieschecks/agents.mdAgent permissionschecks/cron.mdScheduled jobschecks/skills.mdInstalled skillschecks/sessions.mdSession isolationchecks/network.mdNetwork configuration

Attack Scenario Templates

Use these for expert-level explanations: FileScenarioscenarios/prompt-injection.mdExternal content manipulationscenarios/session-leak.mdCross-session data exposurescenarios/privilege-escalation.mdTool permission abusescenarios/credential-exposure.mdSecret leakagescenarios/unauthorized-access.mdAccess control bypass

Risk Levels

๐Ÿ”ด Critical - Immediate action required. Active exploitation possible. ๐ŸŸ  High - Significant risk. Should fix soon. ๐ŸŸก Medium - Notable concern. Plan to address. ๐ŸŸข Low - Minor issue or best practice recommendation. โšช Info - Not a risk, but worth noting.

Risk Matrix

Tool Permissions Minimal Full โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” Exposure โ”‚ ๐ŸŸข โ”‚ ๐ŸŸก โ”‚ Low โ”‚ Safe โ”‚ Caution โ”‚ โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”‚ ๐ŸŸก โ”‚ ๐Ÿ”ด โ”‚ High โ”‚ Caution โ”‚ Critical โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ Exposure = Who can talk to the bot (DM policy, group access, public channels) Tool Permissions = What the bot can do (exec, file access, messaging, browser)

Context-Aware Exceptions

Don't just pattern match. Consider context: ContextAdjustmentPrivate channel, 2-3 trusted membersLower risk even with execVPN/Tailscale only accessNetwork exposure less criticalSelf-hosted, single userSession isolation less importantContainerized environmentPrivilege escalation less severe Always ask about environment if unclear.

Applying Fixes

CRITICAL RULES: Never auto-apply fixes. Always show suggestions first. Warn about functional impact. If a fix might break something, say so. Get explicit user confirmation before any config changes. Example flow: Agent: "Changing this setting will disable exec in #dev channel. If you're using code execution there, it will stop working. Apply this fix?" User: "yes" Agent: [apply fix via gateway config.patch]

Language Rules

Internal processing: Always English Thinking/reasoning: Always English Final user-facing report: Match user's language Technical terms: Keep in English (exec, cron, gateway, etc.)

Auto-Review Triggers

Invoke automatically when: Skill installation: clawhub install <skill> or manual addition Agent creation/modification: New agent or tool changes Cron job creation/modification: New or modified scheduled tasks For auto-reviews, focus only on changed component unless full audit requested.

Quick Commands

User RequestAction"check channels only"Run channels.md check"audit cron jobs"Run cron.md check"full audit"All checks"more detail"Re-run with verbose output

Trust Hierarchy

Apply appropriate trust levels: LevelEntityTrust Model1OwnerFull trust โ€” has all access2AI AgentTrust but verify โ€” sandboxed, logged3AllowlistsLimited trust โ€” specified users only4StrangersNo trust โ€” blocked by default

Incident Response Reference

If compromise suspected:

Containment

Stop gateway process Set gateway.bind to loopback (127.0.0.1) Disable risky DM/group policies

Rotation

Regenerate gateway auth token Rotate browser control tokens Revoke and rotate API keys

Review

Check gateway logs and session transcripts Review recent config changes Re-run full security audit

Files Reference

~/.openclaw/skills/secucheck/ โ”œโ”€โ”€ SKILL.md # This file โ”œโ”€โ”€ skill.json # Package metadata โ”œโ”€โ”€ README.md # User documentation โ”œโ”€โ”€ scripts/ โ”‚ โ”œโ”€โ”€ full_audit.sh # Complete audit (JSON output) โ”‚ โ”œโ”€โ”€ runtime_check.sh # Live system checks โ”‚ โ”œโ”€โ”€ gather_config.sh # Config extraction (redacted) โ”‚ โ”œโ”€โ”€ gather_skills.sh # Skill security scan โ”‚ โ”œโ”€โ”€ gather_agents.sh # Agent configurations โ”‚ โ”œโ”€โ”€ serve_dashboard.sh # Generate + serve HTML report โ”‚ โ””โ”€โ”€ generate_dashboard.sh โ”œโ”€โ”€ dashboard/ โ”‚ โ””โ”€โ”€ template.html # Dashboard template โ”œโ”€โ”€ checks/ โ”‚ โ”œโ”€โ”€ runtime.md # Runtime interpretation โ”‚ โ”œโ”€โ”€ channels.md # Channel policy checks โ”‚ โ”œโ”€โ”€ agents.md # Agent permission checks โ”‚ โ”œโ”€โ”€ cron.md # Cron job checks โ”‚ โ”œโ”€โ”€ skills.md # Skill safety checks โ”‚ โ”œโ”€โ”€ sessions.md # Session isolation โ”‚ โ””โ”€โ”€ network.md # Network exposure โ”œโ”€โ”€ scenarios/ โ”‚ โ”œโ”€โ”€ prompt-injection.md โ”‚ โ”œโ”€โ”€ session-leak.md โ”‚ โ”œโ”€โ”€ privilege-escalation.md โ”‚ โ”œโ”€โ”€ credential-exposure.md โ”‚ โ””โ”€โ”€ unauthorized-access.md โ””โ”€โ”€ templates/ โ”œโ”€โ”€ report.md # Full report template โ”œโ”€โ”€ finding.md # Single finding template โ””โ”€โ”€ summary.md # Quick summary template

Security Assessment Questions

When auditing, consider: Exposure: What network interfaces can reach this agent? Authentication: What verification does each access point require? Isolation: What boundaries exist between agent and host? Trust: What content sources are considered "trusted"? Auditability: What evidence exists of agent's actions? Least Privilege: Does agent have only necessary permissions? Remember: This skill exists to make OpenClaw self-aware of its security posture. Use regularly, extend as needed, never skip the audit.

Category context

Identity, auth, scanning, governance, audit, and operational guardrails.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
5 Docs1 Config
  • SKILL.md Primary doc
  • checks/agents.md Docs
  • checks/channels.md Docs
  • checks/cron.md Docs
  • README.md Docs
  • _meta.json Config