返回顶部
o

openclaw-security-audit

Audit OpenClaw configuration for security risks and generate a remediation report using the user's configured LLM.

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
2,291
下载量
1
收藏
概述
安装方式
版本历史

openclaw-security-audit

# OpenClaw Security Audit Skill Local-only skill that audits `~/.openclaw/openclaw.json`, runs 15+ security checks, and generates a detailed report using the user's existing LLM configuration. No external APIs or keys required. ## When to Use This Skill - The user asks for a security audit of their OpenClaw instance. - The user wants a remediation checklist for configuration risks. - The user is preparing an OpenClaw deployment and wants a hardening review. ## How It Works 1. Read config with standard tools (`cat`, `jq`). 2. Extract security-relevant settings (NEVER actual secrets). 3. Build a structured findings object with metadata only. 4. Pass findings to the user's LLM via OpenClaw's normal agent flow. 5. Generate a markdown report with severity ratings and fixes. ## Inputs - target_config_path (optional): Path to OpenClaw config file. - default: ~/.openclaw/openclaw.json ## Outputs - Markdown report including: - Overall risk score (0-100) - Findings categorized by severity (Critical/High/Medium/Low) - Each finding with description, why it matters, how to fix, example config - Prioritized remediation roadmap ## Security Checks (15+) 1. API keys hardcoded in config (vs environment variables) 2. Weak or missing gateway authentication tokens 3. Unsafe gateway.bind settings (0.0.0.0 without proper auth) 4. Missing channel access controls (allowFrom not set) 5. Unsafe tool policies (elevated tools without restrictions) 6. Sandbox disabled when it should be enabled 7. Missing rate limits on channels 8. Secrets potentially exposed in logs 9. Outdated OpenClaw version 10. Insecure WhatsApp configuration 11. Insecure Telegram configuration 12. Insecure Discord configuration 13. Missing audit logging for privileged actions 14. Overly permissive file system access scopes 15. Unrestricted webhook endpoints 16. Insecure default admin credentials ## Data Handling Rules - Strip all secrets before analysis. - Only report metadata such as present/missing/configured. - Do not log or emit actual key values. - Use local-only execution; no network calls. ## Example Findings Object (Redacted) ```json { "config_path": "~/.openclaw/openclaw.json", "openclaw_version": "present", "gateway": { "bind": "0.0.0.0", "auth_token": "missing" }, "channels": { "allowFrom": "missing", "rate_limits": "missing" }, "secrets": { "hardcoded": "detected" }, "tool_policies": { "elevated": "unrestricted" } } ``` ## Report Format The report must include: - Overall risk score (0-100) - Severity buckets: Critical, High, Medium, Low - Each finding: description, why it matters, how to fix, example config - Prioritized remediation roadmap ## Skill Flow (Pseudo) ```text read_config_path = input.target_config_path || ~/.openclaw/openclaw.json raw_config = cat(read_config_path) json = jq parse raw_config metadata = extract_security_metadata(json) findings = build_findings(metadata) report = openclaw.agent.analyze(findings, format=markdown) return report ``` ## Notes - Uses the user's existing OpenClaw LLM configuration (Opus, GPT, Gemini, and local models). - No external APIs or special model access are required.

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 openclaw-security-auditor-1776214743 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 openclaw-security-auditor-1776214743 技能

通过命令行安装

skillhub install openclaw-security-auditor-1776214743

下载 Zip 包

⬇ 下载 openclaw-security-audit v1.0.0

文件大小: 14 KB | 发布时间: 2026-4-17 15:38

v1.0.0 最新 2026-4-17 15:38
Initial release: Local OpenClaw security audit skill with automated risk reporting.

- Audits ~/.openclaw/openclaw.json or a user-specified config for 15+ security risks.
- Runs checks including auth tokens, gateway settings, tool policies, secrets, logging, and more.
- Generates a detailed markdown report with risk score, categorized findings (Critical/High/Medium/Low), and step-by-step remediation guidance.
- No external APIs or network calls; uses only local tools (cat, jq) and user's existing LLM setup.
- Strictly avoids handling or revealing secrets; only analyzes configuration metadata.

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部