High Risk:This skill has significant security concerns. Review the findings below before installing.

openclaw-security

Caution·Scanned 2/17/2026

High-risk orchestrator that runs local skill scripts and external installers against agent workspaces. It executes shell commands (subprocess.run, python3 scripts/security.py) and performs network installs (clawhub, git clone https://github.com/AtlasPA/openclaw-security.git) using --workspace paths like /path/to/workspace and ~/.openclaw/workspace.

from clawhub.ai·ve21d96b·28.6 KB·0 installs
Scanned from 1.0.0 at e21d96b · Transparency log ↗
$ vett add clawhub.ai/atlaspa/openclaw-securityReview security findings before installing

OpenClaw Security Suite

One skill to rule them all. Installs, configures, and orchestrates the complete OpenClaw security stack for OpenClaw, Claude Code, and any Agent Skills-compatible tool.

11 security tools. 1 command.

The Problem

Agent workspace security requires multiple layers: integrity monitoring, secret scanning, permission auditing, network DLP, supply chain analysis, credential protection, injection defense, compliance enforcement, audit trails, skill verification, and incident response.

Setting up and running 11 separate tools is tedious. This skill installs them all, initializes them, and provides a unified dashboard and scan pipeline.

Install

# Install the orchestrator
git clone https://github.com/AtlasPA/openclaw-security.git
cp -r openclaw-security ~/.openclaw/workspace/skills/

# Install all 11 security tools
python3 scripts/security.py install

# Initialize everything
python3 scripts/security.py setup

# Check workspace health
python3 scripts/security.py status

Commands

CommandWhat it does
installInstall all 11 free security skills from ClawHub
setupInitialize tools that need it (baseline, signing, ledger, policy)
statusUnified dashboard — health check across all tools
scanFull security scan — runs every scanner in logical order
listShow which tools are installed (free/pro)
updateUpdate all installed skills to latest versions
protectRun Pro countermeasures across all tools (requires Pro)

All commands accept --workspace /path or -w /path. Auto-detects from $OPENCLAW_WORKSPACE or ~/.openclaw/workspace.

Scan Pipeline Order

The scan command runs tools in a logical security sequence:

  1. Sentinel — Are installed skills safe? (supply chain)
  2. Signet — Have skills been tampered? (signing verification)
  3. Warden — Have workspace files changed? (integrity)
  4. Bastion — Are there injection patterns? (prompt injection)
  5. Sentry — Are secrets exposed? (credential scanning)
  6. Vault — Are credentials properly protected? (lifecycle)
  7. Arbiter — Do skills have excess permissions? (permission audit)
  8. Egress — Are there exfiltration risks? (network DLP)
  9. Marshal — Does everything meet policy? (compliance)
  10. Ledger — Is the audit trail intact? (chain verification)
  11. Triage — Any active incidents? (forensics)

What Gets Installed

ToolDomainFree Features
wardenWorkspace integrityBaseline checksums, injection scanning
sentrySecret scanning25+ secret patterns, file scanning
arbiterPermission auditing7 permission categories, risk scoring
signetSkill signingSHA-256 manifests, tamper detection
ledgerAudit trailHash-chained JSONL logs
egressNetwork DLPURL detection, exfil pattern matching
sentinelSupply chainObfuscation detection, risk scoring
vaultCredential lifecycleExposure auditing, permission checks
bastionInjection defensePattern scanning, boundary analysis
marshalCompliancePolicy enforcement, command restrictions
triageIncident responseInvestigation, timeline, evidence

Pro Upgrade

Free tools detect threats. Pro tools respond to them.

Become a sponsor to unlock automated countermeasures: restore, quarantine, rollback, blocking, remediation, and protection sweeps across all 11 tools.

Requirements

  • Python 3.8+
  • ClawHub CLI (npm install -g clawhub) for install/update commands
  • No other external dependencies (stdlib only)
  • Cross-platform: Windows, macOS, Linux

License

MIT