clawdbot-security-check

低风险
作者:TheSethRose | 审计时间:2026-02-26T09:59:20.936Z | 规则集:0.2.0

快速安装

将技能安装到你的 Agent

clawhub install clawdbot-security-check

技能介绍

对 Clawdbot 自身的配置执行全面的只读安全审计。这是一项基于知识的技能,旨在教导 Clawdbot 识别整个系统的加固机会。当……时使用

任务自动化
数据处理
API 集成
错误处理

使用场景

1 工作流自动化
2 数据转换
3 系统集成

文档(原文)

来源:README.md
以下为作者原文(通常为英文)。安装请以页面顶部“快速安装”为准。

Clawdbot Security Check

🔒 Self-security audit framework for Clawdbot

Inspired by the security hardening framework from ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ and integrated with official ClawdBot security documentation.

This skill teaches Clawdbot to audit its own security posture using first-principles reasoning. Not a hard-coded script—it's a knowledge framework that Clawdbot applies dynamically to detect vulnerabilities, understand their impact, and recommend specific remediations.

What This Is

  • 🧠 Knowledge-based - Embeds the security framework directly in Clawdbot
  • 🔍 Dynamic detection - Clawdbot learns to find issues, not just run a script
  • 📚 Extensible - Add new checks by updating the skill
  • 🔒 100% Read-only - Only audits; never modifies configuration

The 12 Security Domains

# Domain Severity Key Question
1 Gateway Exposure 🔴 Critical Is the gateway bound to 0.0.0.0 without auth?
2 DM Policy 🟠 High Are DMs restricted to an allowlist?
3 Group Access Control 🟠 High Are group policies set to allowlist?
4 Credentials Security 🔴 Critical Are secrets in plaintext with loose permissions?
5 Browser Control Exposure 🟠 High Is remote browser control secured?
6 Gateway Bind & Network 🟠 High Is network exposure intentional and controlled?
7 Tool Access & Elevated 🟡 Medium Are tools restricted to minimum needed?
8 File Permissions & Disk 🟡 Medium Are file permissions properly set?
9 Plugin Trust & Model 🟡 Medium Are plugins allowlisted and models current?
10 Logging & Redaction 🟡 Medium Is sensitive data redacted in logs?
11 Prompt Injection 🟡 Medium Is untrusted content wrapped?
12 Dangerous Commands 🟡 Medium Are destructive commands blocked?

Installation

# Via ClawdHub
clawdhub install clawdbot-security-check

# Or clone for manual installation
git clone https://github.com/TheSethRose/Clawdbot-Security-Check.git
cp -r Clawdbot-Security-Check ~/.clawdbot/skills/

Usage

Via Clawdbot

@clawdbot audit my security
@clawdbot run security check
@clawdbot what vulnerabilities do I have?
@clawdbot security audit --deep
@clawdbot security audit --fix

Security Principles

Running an AI agent with shell access requires caution. Focus on:

  1. Who can talk to the bot — DM policies, group allowlists, channel restrictions
  2. Where the bot is allowed to act — Network exposure, gateway binding, proxy configs
  3. What the bot can touch — Tool access, file permissions, credential storage

Audit Functions

The --fix flag applies these guardrails:

  • Changes groupPolicy from open to allowlist for common channels
  • Resets logging.redactSensitive from off to tools
  • Tightens permissions: .clawdbot to 700, configs to 600
  • Secures state files including credentials and auth profiles

High-Level Checklist

Treat findings in this priority order:

  1. 🔴 Lock down DMs and groups if tools are enabled on open settings
  2. 🔴 Fix public network exposure immediately
  3. 🟠 Secure browser control with tokens and HTTPS
  4. 🟠 Correct file permissions for credentials and config
  5. 🟡 Only load trusted plugins
  6. 🟡 Use modern models for bots with tool access

Extending the Framework

Add new checks by contributing to SKILL.md:

## 13. New Vulnerability 🟡 Medium

**What to check:** What config reveals this?

**Detection:**
```bash
command-to-check-config

Vulnerability: What can go wrong?

Remediation:

{ "fix": "here" }

## Architecture

Clawdbot-Security-Check/
├── SKILL.md # Knowledge framework (the skill - source of truth)
├── skill.json # Clawdbot metadata
├── README.md # This file
└── .gitignore


**SKILL.md** is the source of truth—it teaches Clawdbot everything it needs to know.

## Why This Approach?

Hard-coded scripts get stale. A knowledge framework evolves:

- ✅ Add new vulnerabilities without code changes
- ✅ Customize checks for your environment
- ✅ Clawdbot understands the "why" behind each check
- ✅ Enables intelligent follow-up questions

> "The goal isn't to find vulnerabilities—it's to understand security deeply enough that vulnerabilities can't hide." — Daniel Miessler

## Output Example

═══════════════════════════════════════════════════════════════
🔒 CLAWDBOT SECURITY AUDIT
═══════════════════════════════════════════════════════════════
Timestamp: 2026-01-26T15:30:00.000Z

┌─ SUMMARY ───────────────────────────────────────────────
│ 🔴 Critical: 1
│ 🟠 High: 2
│ 🟡 Medium: 1
│ ✅ Passed: 8
└────────────────────────────────────────────────────────

┌─ FINDINGS ──────────────────────────────────────────────
│ 🔴 [CRITICAL] Gateway Exposure
│ Finding: Gateway bound to 0.0.0.0:18789 without auth
│ → Fix: Set gateway.auth_token environment variable

│ 🟠 [HIGH] DM Policy
│ Finding: dm_policy is "allow" (all users)
│ → Fix: Set dm_policy to "allowlist" with trusted users
└────────────────────────────────────────────────────────

This audit was performed by Clawdbot's self-security framework.
No changes were made to your configuration.


## Contributing

1. Fork the repo
2. Add new security knowledge to SKILL.md
3. Submit PR

## License

MIT - Security-first, open source forever.

---

**Clawdbot knows its attack surface. Do you?**

安全审计

低风险

摘要

对 Clawdbot 自身的配置执行全面的只读安全审计。这是一项基于知识的技能,旨在教导 Clawdbot 识别整个系统的加固机会。当用户要求“run security check”、“audit clawdbot”、“check security hardening”或询问“what vulnerabilities does my Clawdbot have”时使用。此技能利用 Clawdbot 的内部功能和文件系统访问权限来检查配置、检测错误配置并推荐补救措施。它被设计为可扩展的——可以通过更新此技能的知识来添加新的检查。

风险画像 危险 隐私 范围 声誉 质量

ToxicSkills 分析

黑名单
未命中
提示词注入
未检测到

当前静态检测未发现 Toxic 信号。

关键风险 0 项

暂无 LLM 风险要点(LLM 未启用或无缓存)。

确定性发现(证据)

规则 严重性 文件 片段
QUALITY_README_PRESENT README 行 无
README detected

评分标准

每个技能从 5 个维度评分,加权总分决定星级。

代码毒性 100/100 (权重 30%)
隐私风险 100/100 (权重 25%)
权限范围 100/100 (权重 20%)
作者声誉 75/100 (权重 15%)
代码质量 78/100 (权重 10%)

星级说明

5★ 安全 — 总分 ≥ 80
4★ 良好 — 总分 70–79
3★ 注意 — 总分 60–69
2★ 有风险 — 总分 40–59
1★ 危险 — 总分 < 40

为何是这个评分?

所有维度均高于 60 分,该技能通过安全基线。

更多技能

VettedSkillsHub

从 ClawHub(ClawdBot / OpenClaw 官方市场)精选下载量前 100 的技能,进行独立 5 维度安全审计。证据透明可查,评分可复现,一键安装。

关于

本站评分为 best-effort 静态分析,分数可复现、证据可追溯。在敏感环境中仍应进行人工审计与隔离部署。

© 2026 VettedSkillsHub。ClawdBot 和 OpenClaw 为社区项目。