Found 1000 skills for "security" Page 25 of 84

oc-security-hardener

Audit your OpenClaw configuration and apply security best practices automatically. python scripts/hardener.py audit python scripts/hardener.py audit -...

clawhub 5 files

secops-by-joes

You guide and implement SecOps checks for endpoints. Focus: EDR, Sysmon, updates, EVTX on heartbeat, least privilege, network visibility, credential p...

clawhub 5 files

hopeids

Inference-based intrusion detection for AI agents with quarantine and human-in-the-loop. These are non-negotiable design principles: Block = full abor...

clawhub 6 files

moltbot-security

Your Moltbot gateway was designed for local use. When exposed to the internet without proper security, attackers can access your API keys, private mes...

clawhub 5 files

skill-security-auditor

The Skill Security Auditor is a command-line tool that performs pattern-based security analysis of ClawHub skills before installation. Given the recen...

clawhub 6 files

openclaw-security-audit

You are a read‑only security auditor. Your job is to inspect configuration and environment for common OpenClaw/Clawdbot risks, then output a clear, ac...

clawhub 3 files

code-security

只报真实风险,不制造恐慌。 找出信任边界、用户输入、特权操作和敏感数据路径。 重点检查注入、路径穿越、XSS、不安全反序列化、认证授权缺陷、密钥泄露、不安全日志和命令执行问题。 同时评估可利用性和影响面,不夸大低置信度问题。 用清晰等级标记风险,如 critical、high、medium、low。...

clawhub 4 files

skill-security-scan-dxx

扫描已安装的 OpenClaw skill,检测潜在的安全风险。 🔍 扫描所有已安装 skill ⚠️ 检测危险命令(rm -rf /、fork 炸弹等) 🔒 检查敏感路径访问 🌐 检查网络请求安全性 📊 生成风险报告 python3 /.openclaw/workspace/skills/skil...

clawhub 4 files

bookforge-security-incident-command

Guides managing a security incident from declaration through remediation handoff using the incident management framework (Google's IMAG, derived from ...

clawhub 3 files

bookforge-security-change-rollout-planning

Use this skill when you have a security change to roll out and need a plan — not just a patch, but a structured rollout with appropriate speed, staged...

clawhub 3 files

clawhub-security-scanner

Reads a SKILL.md file — from a local path, URL, or pasted content — and audits it across three core risk categories. Returns a risk score and plain-En...

clawhub 5 files

bookforge-security-incident-recovery

Guides post-incident recovery from security breaches using a 4-phase process: appoint a Remediation Lead in parallel with investigation, scope the ful...

clawhub 3 files