Search Skills
Search across 54932 indexed skills
clawdiary
An OpenClaw skill for integrating with ClawDiary - a cloud-based audit diary and high-risk operation interception gateway for AI Agents. To use this g...
hipaa-gap-analysis
You are a HIPAA compliance auditor performing a gap analysis. Your task is to assess whether a compliance document adequately addresses specific HIPAA...
best-practices-ecc
Modern web development standards based on Lighthouse best practices audits and production-proven coding standards. Covers security, browser compatibil...
agentvulnly-vulnerability-scanner
Scan AI agent deployments for 7 critical security vulnerabilities. Analyzes agent architecture, framework, tools, authentication, data flow, and secur...
nidhov01-skill-vetter
Security-first vetting protocol for AI agent skills. Never install a skill without vetting it first. Before installing any skill from ClawdHub Before ...
chen-skill-vetter
Security-first vetting protocol for AI agent skills. Never install a skill without vetting it first. Before installing any skill from ClawdHub Before ...
afrexai-vendor-risk
Score and manage third-party vendor risk across security, financial stability, compliance, operational dependency, and data handling. Built for procur...
isnad-scan
Scan any skill, package, or directory for security threats before installing or running it. isnad-scan <path> Scans a directory and reports findings b...
yidun-skill-sec
Hybrid local-cloud security scanner for third-party code packages. Scans fast, scores precisely, fails safely. This skill uploads only non-sensitive m...
skill-vetter-1
Security-first vetting protocol for AI agent skills. Never install a skill without vetting it first. Before installing any skill from ClawdHub Before ...
claw1-skill-auditor
Analyze OpenClaw skill files for security risks, quality issues, and best-practice violations. Built in response to the ClawHavoc incident where 341+ ...
skill-update-delta-monitor
Helps identify security-relevant changes in skills after installation, catching the class of attacks that bypasses install-time verification by introd...