# Send Security Best Practices to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "security-best-practices",
    "name": "Security Best Practices",
    "source": "tencent",
    "type": "skill",
    "category": "安全合规",
    "sourceUrl": "https://clawhub.ai/ivangdavila/security-best-practices",
    "canonicalUrl": "https://clawhub.ai/ivangdavila/security-best-practices",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/security-best-practices",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=security-best-practices",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "SKILL.md",
      "exceptions.md",
      "memory-template.md",
      "remediation-patterns.md",
      "review-playbook.md",
      "setup.md"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/security-best-practices"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/security-best-practices",
    "downloadUrl": "https://openagent3.xyz/downloads/security-best-practices",
    "agentUrl": "https://openagent3.xyz/skills/security-best-practices/agent",
    "manifestUrl": "https://openagent3.xyz/skills/security-best-practices/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/security-best-practices/agent.md"
  }
}
```
## Documentation

### Setup

On first use, read setup.md for integration guidelines.
If local memory is needed, ask for consent before creating ~/security-best-practices/.

### When to Use

Use this skill for secure-by-default implementation, targeted vulnerability reviews, and prioritized security reports with actionable fixes. Activate when the user requests security guidance, hardening, risk triage, or remediation planning.

### Architecture

Memory lives in ~/security-best-practices/. See memory-template.md for setup.

~/security-best-practices/
|- memory.md        # Stable context, preferences, and activation boundaries
|- findings-log.md  # Findings registry with severity and status
\`- exceptions.md    # Approved security exceptions and review dates

### Quick Reference

Load only the minimum file needed for the current request.

TopicFileSetup processsetup.mdMemory templatememory-template.mdFull review workflowreview-playbook.mdSeverity model and scoringseverity-model.mdSafe remediation patternsremediation-patterns.mdRisk exception logexceptions.md

### 1. Establish Scope and Evidence First

Before any conclusions, confirm:

System boundary (service, module, endpoint, or workflow)
Stack evidence (language, framework, deployment context)
Threat assumptions (external attacker, internal misuse, privilege level)

No evidence, no finding.

### 2. Map Risks to a Repeatable Baseline

Evaluate every review against a consistent baseline:

Authn/authz boundaries
Input validation and output encoding
Secrets handling and configuration safety
Dependency and supply chain posture
Logging, error handling, and data exposure controls

Use review-playbook.md to keep scans systematic instead of ad hoc.

### 3. Produce Findings That Are Verifiable

Each finding must include:

Severity from severity-model.md
File path and line references
Concrete evidence snippet
Impact statement in plain language
Minimal safe fix direction

Avoid speculative findings without repository evidence.

### 4. Prioritize Exploitability Over Theory

Rank by practical risk, not by checklist volume:

Reachability from untrusted inputs
Privilege required by attacker
Blast radius if exploited
Ease of abuse and repeatability

High confidence, exploitable issues come first.

### 5. Remediate With Minimal Product Risk

Fix one finding at a time:

Prefer small diffs that preserve existing behavior
Add tests when security fixes alter code paths
Flag expected behavior changes before implementing
Re-run project validation after each fix batch

Use remediation-patterns.md for safe rollouts.

### 6. Respect Explicit Exceptions and Ownership

If the user accepts a known risk:

Record rationale in exceptions.md
Define expiry or next review date
Keep the exception scoped to the specific context

Never apply broad silent overrides.

### Security Review Traps

Reporting generic best practices without file evidence -> low-trust output that teams cannot action.
Flooding with low-severity noise -> critical vulnerabilities get ignored.
Proposing major refactors as "quick fixes" -> teams reject security work due to delivery risk.
Ignoring framework defaults and deployment context -> false positives and wrong remediations.
Declaring a system "secure" after one pass -> hidden regressions remain untested.

### Security & Privacy

Data that leaves your machine:

None by default from this skill itself.

Data that stays local:

Review preferences and finding history in ~/security-best-practices/.
Exception rationale in local memory files only.

This skill does NOT:

Exfiltrate source code to undeclared third-party endpoints.
Mark unresolved risks as fixed.
Perform hidden destructive changes.

### Related Skills

Install with clawhub install <slug> if user confirms:

auth - Authentication design and hardening.
authorization - Access control and permission boundaries.
encryption - Key management and cryptographic hygiene.
firewall - Network exposure review and policy controls.
devops - Secure delivery, CI checks, and operational safeguards.

### Feedback

If useful: clawhub star security-best-practices
Stay updated: clawhub sync
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: ivangdavila
- Version: 1.0.0
## Source health
- Status: healthy
- Source download looks usable.
- Yavira can redirect you to the upstream package for this source.
- Health scope: source
- Reason: direct_download_ok
- Checked at: 2026-04-23T16:43:11.935Z
- Expires at: 2026-04-30T16:43:11.935Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/security-best-practices)
- [Send to Agent page](https://openagent3.xyz/skills/security-best-practices/agent)
- [JSON manifest](https://openagent3.xyz/skills/security-best-practices/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/security-best-practices/agent.md)
- [Download page](https://openagent3.xyz/downloads/security-best-practices)