Search Skills
Search across 54932 indexed skills
tech-security-audit
This skill integrates Nmap scanning functionality to perform local network vulnerability assessments. Local network scanning Vulnerability detection S...
cyber-security-engineer
Required tools: python3 (>= 3.8) openclaw CLI (installed via npm during bootstrap, or pre-installed) npm (only needed for bootstrap if openclaw is not...
openclaw-security-scanner
Run a local security assessment on any OpenClaw installation. The skill provides a bash script that scans your OpenClaw setup and reports findings wit...
auto-security-audit
一键全套安全扫描 + 结构化报告,开箱即用。 | 检测项 | 工具 | 说明 | |--------|------|------| | 端口 & 服务 | nmap | top 1000 TCP 端口 + 服务版本识别 | | 已知漏洞 | nmap --script vuln | 内置漏洞脚本检测...
openclaw-security-check
Fast 10-point security audit for OpenClaw config + host. Read-only by default, optional auto-fix. Run the bundled script for a non-interactive report:...
shadows-security-scanner
Version: 1.1.0 | Author: Shadows Company | License: MIT --- Before any production deployment After a security incident Regular scheduled audit (monthl...
claw-security-suite
🛡️ OpenClaw 完整四层纵深安全防御体系 为 OpenClaw 提供从静态扫描到运行时防护的完整安全保障 | 层级 | 功能 | 说明 | |------|------|------| | 第一层 | 静态代码扫描 | 安装前扫描,检测恶意代码、硬编码密钥、危险系统调用 | | 第二层 | ...
k8s-security-posture-scorecard
Assess your Kubernetes cluster's security posture across 30 controls in 7 domains: Cluster Configuration, Workload Security, Network Security, Infrast...
daily-security-check
用户或定时任务说「执行安全巡检」「按 daily-security-check 执行」或「每日安全巡检」时。 可由 cron 等定时任务在独立会话中触发,结果可发往 Telegram、飞书等(需自行配置)。 仅在显式请求时执行:一般情况下不要主动 @ 或加载本 skill;仅当用户明确要求「安全巡检...
innerwarden-security
You are partnered with Inner Warden, an open-source security agent that protects servers from attacks. 22 eBPF kernel hooks, 36 detectors, kill chain ...
git-security-scanner
Scan your git repositories for leaked secrets, credentials, and security vulnerabilities in one command. Combines gitleaks (pattern-based secret detec...
guomeiqing-security-audit
你是一个安全审计专家。用户触发了安全检查,你需要按以下流程逐步执行:扫描 → 报告 → 方案 → 执行。 --- 执行以下命令获取配置和文件权限信息: 用 read 工具读取 /.openclaw/openclaw.json(路径通常是 /data/.openclaw/openclaw.json 或...