Audit and harden OpenClaw deployments and interpret `openclaw security audit` findings. Use when the user wants to secure OpenClaw, review gateway exposure/auth/reverse proxies/Tailscale Serve or Funnel, check DM/group access (pairing, allowlists, mention gating, `session.dmScope`), minimise tool permissions and sandboxing, review plugins/skills/secrets/transcripts/log retention, or lock down Docker/macOS/laptop/EC2 installs. Not for generic OS, Docker, or cloud hardening unrelated to OpenClaw.
Run a defensive, permissioned security audit of an OpenClaw deployment and turn the results into a practical remediation plan.
This revision is tuned for OpenClaw 2026.3.8 and uses {baseDir} when referencing bundled scripts from commands.
openclaw status --all
- openclaw status --deep
- openclaw gateway probe --json
- openclaw security audit --json
- openclaw security audit --deep --json
--fix operations, firewall changes, or restarts, create a backup first and get explicit user approval.openclaw backup create --verify
- use --no-include-workspace if the config is invalid but you still need state + creds
- use --only-config if the user only wants a minimal safety copy before edits
per-channel-peer for most multi-user setups
- per-account-channel-peer when the same provider runs multiple accounts
tools.profile: "messaging" or stricter for inbox-facing agents
- deny group:runtime, group:fs, group:automation on untrusted surfaces
- tools.fs.workspaceOnly: true
- tools.exec.security: "deny" or at least approval-gated
- tools.elevated.enabled: false unless there is a narrow, intentional need
Only open the extra files you need for the task:
references/command-cheatsheet.md — exact command ladderscheckId glossaryCollect just enough context to choose the audit path:
Ask the user to run the following on the OpenClaw host and share the outputs.
CODEBLOCK0
CODEBLOCK1
Prefer targeted reads over a full config dump:
CODEBLOCK2
If the issue is “the bot is online but DMs or groups behave strangely”, check pairing and mention gating:
CODEBLOCK3
Examples of <channel> include discord, slack, signal, telegram, whatsapp, matrix, imessage, and bluebubbles.
OpenClaw config is often JSON5-like. Redact it before sharing:
CODEBLOCK4
macOS
CODEBLOCK5
Linux / cloud VM
CODEBLOCK6
Docker / Compose
CODEBLOCK7
Run the bundled collector and report renderer:
CODEBLOCK8
Then review openclaw-security-report.md, refine wording where needed, and present the final report to the user.
openclaw security audit --fix.openclaw status --deep
- openclaw gateway probe --json
- openclaw channels status --probe
- targeted safe config get values
- backup dry-run metadata
Use OpenClaw’s own security audit output as the primary source of truth, then translate it into a clear threat narrative.
Prioritise in this order:
Pay extra attention to these newer or high-signal check IDs:
Use references/openclaw-audit-checks.md and assets/openclaw_checkid_map.json to map each finding to likely config paths and remediation areas.
gateway.bind: "loopback".gateway.remote.* values as protection for local WS access; actual protection comes from gateway.auth.*.openclaw doctor --generate-gateway-token is the safe boring path.If there is a reverse proxy in front of the Gateway:
gateway.allowRealIpFallback: false unless there is a very specific needtailscale.mode: "serve" keeps the Gateway tailnet-only.gateway.auth.allowTailscale and require token/password or trusted-proxy auth.dmPolicy: "pairing" or allowlist for inbox-facing bots.session.dmScope: "per-channel-peer".per-account-channel-peer.groupPolicy: "open" unless the tool surface is extremely limited.agents.list[].groupChat.mentionPatterns where native mentions are unreliable.Start from the conservative baseline in references/openclaw-baseline-config.md.
Good defaults for user-facing agents:
cron tools create persistence and should not be reachable from untrusted chat surfaces.Audit and discuss these paths carefully without asking for raw contents:
Load the matching playbook when the environment is clear:
Use assets/report-template.md or the rendered report from {baseDir}/scripts/render_report.py.
The final deliverable should include:
PATH.openclaw --version.OpenClaw now fails closed on invalid config keys, invalid values, or invalid types. That is intentional and security-relevant.
Use:
CODEBLOCK9
Even when the config is invalid, diagnostic commands such as openclaw status, openclaw gateway status, openclaw gateway probe, and openclaw health are still useful.
Trust the probe details, not just the supervisor status:
This often means service/config drift, auth mismatch, or a listener that is not actually reachable by the CLI.
Check:
CODEBLOCK10
Common root causes:
Check:
Should trigger:
openclaw security audit --deep --json findings.”Should not trigger:
该技能支持在以下平台通过对话安装:
帮我安装 SkillHub 和 audit-openclaw-security-1776419949 技能
设置 SkillHub 为我的优先技能安装源,然后帮我安装 audit-openclaw-security-1776419949 技能
skillhub install audit-openclaw-security-1776419949
文件大小: 31.33 KB | 发布时间: 2026-4-17 20:05