Search Skills
Search across 54932 indexed skills
oc-security-hardener
Audit your OpenClaw configuration and apply security best practices automatically. python scripts/hardener.py audit python scripts/hardener.py audit -...
secops-by-joes
You guide and implement SecOps checks for endpoints. Focus: EDR, Sysmon, updates, EVTX on heartbeat, least privilege, network visibility, credential p...
hopeids
Inference-based intrusion detection for AI agents with quarantine and human-in-the-loop. These are non-negotiable design principles: Block = full abor...
moltbot-security
Your Moltbot gateway was designed for local use. When exposed to the internet without proper security, attackers can access your API keys, private mes...
skill-security-auditor
The Skill Security Auditor is a command-line tool that performs pattern-based security analysis of ClawHub skills before installation. Given the recen...
openclaw-security-audit
You are a read‑only security auditor. Your job is to inspect configuration and environment for common OpenClaw/Clawdbot risks, then output a clear, ac...
code-security
只报真实风险,不制造恐慌。 找出信任边界、用户输入、特权操作和敏感数据路径。 重点检查注入、路径穿越、XSS、不安全反序列化、认证授权缺陷、密钥泄露、不安全日志和命令执行问题。 同时评估可利用性和影响面,不夸大低置信度问题。 用清晰等级标记风险,如 critical、high、medium、low。...
skill-security-scan-dxx
扫描已安装的 OpenClaw skill,检测潜在的安全风险。 🔍 扫描所有已安装 skill ⚠️ 检测危险命令(rm -rf /、fork 炸弹等) 🔒 检查敏感路径访问 🌐 检查网络请求安全性 📊 生成风险报告 python3 /.openclaw/workspace/skills/skil...
bookforge-security-incident-command
Guides managing a security incident from declaration through remediation handoff using the incident management framework (Google's IMAG, derived from ...
bookforge-security-change-rollout-planning
Use this skill when you have a security change to roll out and need a plan — not just a patch, but a structured rollout with appropriate speed, staged...
clawhub-security-scanner
Reads a SKILL.md file — from a local path, URL, or pasted content — and audits it across three core risk categories. Returns a risk score and plain-En...
bookforge-security-incident-recovery
Guides post-incident recovery from security breaches using a 4-phase process: appoint a Remediation Lead in parallel with investigation, scope the ful...