openclaw-marshal

Verified·Scanned 2/17/2026

This skill audits agent workspaces for command, network, and data-handling policy compliance and generates audit-ready reports. It includes example shell commands to run the tool (e.g., python3 scripts/marshal.py policy --init), which instructs local script execution but shows no external secret exfiltration.

from clawhub.ai·v7e54a1e·45.7 KB·0 installs
Scanned from 1.0.1 at 7e54a1e · Transparency log ↗
$ vett add clawhub.ai/atlaspa/openclaw-marshal

OpenClaw Marshal

Free compliance and policy enforcement for OpenClaw, Claude Code, and any Agent Skills-compatible tool.

Define security policies for agent workspaces, audit installed skills against those policies, and generate audit-ready compliance reports.

Want automated countermeasures? Upgrade to Pro — hook-based blocking, auto-remediation, compliance templates, and team policy sharing. Get Pro access.

The Problem

Agent workspaces accumulate skills that execute commands, access the network, and handle sensitive data. Without a defined security policy, there is no way to verify whether installed skills comply with your requirements — or whether your workspace meets basic security hygiene standards.

Existing tools check individual concerns (secrets, permissions, integrity). Nothing ties them together into a unified compliance posture.

This skill solves that.

Install

# Clone
git clone https://github.com/AtlasPA/openclaw-marshal.git

# Copy to your workspace skills directory
cp -r openclaw-marshal ~/.openclaw/workspace/skills/

Usage

# Create a default security policy
python3 scripts/marshal.py policy --init

# Run a full compliance audit
python3 scripts/marshal.py audit

# Check a specific skill
python3 scripts/marshal.py check openclaw-warden

# Generate a formatted compliance report
python3 scripts/marshal.py report

# Quick status check
python3 scripts/marshal.py status

All commands accept --workspace /path/to/workspace. If omitted, auto-detects from $OPENCLAW_WORKSPACE, current directory, or ~/.openclaw/workspace.

What It Checks

Command Safety

  • Dangerous patterns: eval(), exec(), pipe-to-shell, rm -rf /, chmod 777
  • Policy-blocked commands (customizable)
  • Review-required commands: sudo, docker, ssh

Network Policy

  • Domain allow/blocklists
  • Suspicious TLD patterns (*.tk, *.ml, *.ga)
  • Hardcoded URLs checked against policy

Data Handling

  • Verifies secret scanner (openclaw-sentry) is installed
  • Verifies PII scanning is configured
  • Log retention policy awareness

Workspace Hygiene

  • .gitignore exists with recommended patterns
  • Audit trail (openclaw-ledger) installed and initialized
  • Skill signing (openclaw-signet) installed and configured

Configuration Security

  • Debug modes left enabled
  • Verbose logging in production
  • Debug print statements

Policy File

Running policy --init creates .marshal-policy.json with sensible defaults:

{
  "version": 1,
  "name": "default",
  "rules": {
    "commands": {
      "allow": ["git", "python3", "node", "npm", "pip"],
      "block": ["curl|bash", "wget -O-|sh", "rm -rf /", "chmod 777"],
      "review": ["sudo", "docker", "ssh"]
    },
    "network": {
      "allow_domains": ["github.com", "pypi.org", "npmjs.com"],
      "block_domains": ["pastebin.com", "transfer.sh", "ngrok.io"],
      "block_patterns": ["*.tk", "*.ml", "*.ga"]
    },
    "data_handling": {
      "pii_scan": true,
      "secret_scan": true,
      "log_retention_days": 90
    },
    "workspace": {
      "require_gitignore": true,
      "require_audit_trail": true,
      "require_skill_signing": true,
      "max_skill_risk_score": 50
    }
  }
}

Edit this file to customize rules for your workspace or organization.

Compliance Scoring

Each audit produces a 0-100% score with a letter grade:

ScoreGradeMeaning
90-100%AFully compliant
75-89%BMinor issues
60-74%CNeeds attention
40-59%DSignificant gaps
0-39%FNon-compliant

Deductions are weighted by severity: CRITICAL (25pts), HIGH (15pts), MEDIUM (8pts), LOW (3pts), INFO (1pt).

Exit Codes

CodeMeaning
0Compliant
1Review needed (medium/high findings)
2Critical violations detected

Free vs Pro

FeatureFreePro
Policy definitionYesYes
Compliance auditYesYes
Skill checkingYesYes
Report generationYesYes
Active enforcement via hooks-Yes
Command blocking-Yes
Auto-remediation-Yes
Heartbeat integration-Yes
Policy templates (GDPR, HIPAA, SOC2)-Yes
Team policy sharing-Yes

Requirements

  • Python 3.8+
  • No external dependencies (stdlib only)
  • Cross-platform: Windows, macOS, Linux

License

MIT