返回顶部
c

clawpilot爪式驾驶

>

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
298
下载量
免费
免费
0
收藏
概述
安装方式
版本历史

clawpilot

OpenClaw Expert Skill

Auto-Update Check (Run First)

Before any other action, run the staleness check:

CODEBLOCK0

  • - If UP_TO_DATE: Proceed normally.
  • If STALE: The skill references may be outdated. Before proceeding with the user's task:
1. Fetch the latest 3-5 releases from https://github.com/openclaw/openclaw/releases 2. Fetch https://docs.openclaw.ai/llms.txt for doc changes 3. Search web for recent OpenClaw CVEs or security advisories 4. Compare findings against the version in SKILL.md frontmatter and references/security.md 5. Inform the user of any version gaps or new security issues found 6. If references were updated, run: bash scripts/mark_updated.sh <latest-version> 7. If no updates needed, still mark as checked: INLINECODE4

This check uses a .last_update_check marker file. The threshold is 7 days (configurable via first argument).

Security-First Principle

Every configuration action MUST pass a security review before recommending it.

For each setting change, evaluate:

  1. 1. Blast radius — If this setting is exploited, what can an attacker reach?
  2. Credential exposure — Are secrets stored safely? Permissions correct?
  3. Network surface — Is the gateway exposed beyond what's necessary?
  4. Prompt injection risk — Can untrusted message content manipulate the agent?
  5. Supply chain risk — Are installed skills/plugins from trusted sources?

When recommending configuration, always present the secure baseline first, then explain trade-offs of relaxing it.

Critical CVEs (Must Check)

  • - CVE-2026-25253 (CVSS 8.8): Token exfiltration via Control UI — fixed in 2026.1.29
  • CVE-2026-24763: Command injection — fixed in 2026.1.29
  • CVE-2026-25157: Command injection (chainable with 25253) — fixed in 2026.1.29
  • 2026.2.12: Mass security patch (40+ vulnerabilities) — path traversals, SSRF, privilege escalation
  • 2026.2.15+: SHA-256 sandbox hashing, plugin discovery hardening, ACP session DoS fixes
  • 2026.2.17+: SSRF ISATAP protection, iMessage SSH host-key enforcement, control-plane RPC rate limiting
  • 2026.2.19: Browser relay auth hardening (/extension + /cdp require gateway-token)

Always verify user's version is >= 2026.2.19 before any other advice.

Quick Reference

TaskCommand
InstallINLINECODE8
Onboard
openclaw onboard --install-daemon | | Start gateway | openclaw gateway --port 18789 | | Login channel | openclaw channels login | | Health check | openclaw health | | Security audit | openclaw security audit --deep | | Skill safety scan | openclaw skills scan <path> | | Diagnostics | openclaw doctor | | Update | openclaw update | | View logs | openclaw logs | | Status (redacted) | openclaw status --all | | Agent management | openclaw agents list | | iOS/macOS node | openclaw nodes | | Device management | openclaw devices remove/clear | | Cron (staggered) | openclaw cron add --stagger/--exact | | Spawn subagent | /subagents spawn | | Shell completion | openclaw completion |

Run openclaw --help for full command list.

Documentation Source

Use the reference files bundled in this skill as the primary source. They cover the core config schema, security hardening (including CVEs, OWASP mapping, NIST alignment), cloud deployment, and multi-agent routing.

Fetch from https://docs.openclaw.ai/ only when:

  • - The bundled references do not cover a feature the user asks about
  • Version-specific behavior requires the latest docs
  • A command or config key is absent from the bundled references

Full docs index: https://docs.openclaw.ai/llms.txt

Core Architecture

CODEBLOCK1

  • - Gateway: Single source of truth for sessions, routing, channel connections. Binds to 127.0.0.1:18789 by default.
  • Agents: Isolated entities with own workspace, state dir, auth profiles, session store. Manageable via RPC (agents.create, agents.update, agents.delete).
  • Channels: Plugin-based — WhatsApp, Telegram, Discord, Slack, iMessage, Signal, LINE, Matrix, Teams, Google Chat, Mattermost, BlueBubbles, Feishu, Zalo.
  • Config: ~/.openclaw/openclaw.json (JSON5 format). OPENCLAW_HOME env var overrides home directory for path resolution.
  • Nodes: iOS alpha + macOS nodes for remote code execution via pairing.
  • iOS: Watch Companion (inbox UI, notification relay), Share Extension (forward content to gateway), APNs push notifications (v2026.2.19+).

Secure Baseline

Always start from the secure baseline and relax only with justification. Key defaults: bind: "loopback", dmPolicy: "pairing", sandbox: { mode: "non-main" }, redactSensitive: "tools".

Breaking Changes (v2026.2.10–2026.2.19)

  • - Gateway HTTP APIs blocked for WebChat clients (sessions.patch, sessions.delete)
  • Browser relay now requires gateway-token auth on both /extension and /cdp endpoints
  • Subagent task messages now prefixed with source context
  • Cron stagger defaults applied to recurring top-of-hour schedules

Full baseline template and memory system config: see Configuration Reference and Security Hardening.

Common Workflows

Initial Setup

  1. 1. INLINECODE40
  2. INLINECODE41
  3. INLINECODE42 (select channel)
  4. INLINECODE43
  5. Run openclaw security audit --deep — fix any findings
  6. Run openclaw skills scan — verify installed skills are safe
  7. Verify: openclaw health and open INLINECODE47

Add a Channel

  1. 1. openclaw channels login -> select channel
  2. Configure allowlists in openclaw.json (never use "*" for production)
  3. Set dmPolicy: "pairing" or INLINECODE52
  4. For groups: INLINECODE53
  5. Security review: Verify allowlist, check tool access for that channel

Remote Access (Secure)

Preferred: Tailscale Serve — keeps loopback bind, no public exposure. Alternative: SSH tunnelssh -N -L 18789:127.0.0.1:18789 user@host Never: Bind to 0.0.0.0 without auth token + firewall.

Troubleshooting

  1. 1. openclaw doctor — config validation
  2. INLINECODE57 — gateway status
  3. INLINECODE58 — recent logs
  4. INLINECODE59 — full state (secrets redacted)
  5. INLINECODE60 — search agent memory
  6. INLINECODE61 — view active sessions
  7. Check INLINECODE62

Discover & Install Skills

When user asks about extending OpenClaw with new skills or asks "what skills are available":

  1. 1. Official registry: https://clawhub.com
  2. Community curated list (1,715+ skills, 31 categories): https://github.com/VoltAgent/awesome-openclaw-skills
  3. Install via CLI: INLINECODE63
  4. Manual install: copy skill folder to ~/.openclaw/skills/ (global) or <project>/skills/ (workspace)

Security: Third-party skills execute as trusted code. Hundreds of malicious skills were discovered on ClawHub in early 2026. Always:

  • - Run openclaw skills scan <skill-path> before installing (v2026.2.6+)
  • Review source code, especially skills using exec, browser, or web_fetch tools
  • Pin versions and avoid auto-updating untrusted skills

For skills config schema (load order, per-skill env/apiKey, hot reload), see Configuration Reference. For skill ecosystem URLs (ClawHub registry, community lists), see Security Hardening — Skill Supply Chain.

Local Inspection Scripts

Prefer native CLI when available: openclaw security audit --deep, openclaw doctor, openclaw config get provide authoritative results. Use the scripts below only for deeper heuristic checks or when the CLI is unavailable.

Run these scripts against the local OpenClaw installation. All accept --state-dir PATH to override ~/.openclaw. Scripts use heuristic grep-based parsing of JSON5 config — results are best-effort.

Full Security Audit

bash scripts/security_audit.sh [--state-dir ~/.openclaw]
Check: version/CVE status, file permissions, hardcoded credentials, network binding, DM policies, sandbox config, tool policies, log redaction, plugins, skill supply chain (exfiltration/reverse shell/obfuscation patterns), Control UI security (CVE-2026-25253), reverse proxy config (CVE-2026-24763), gateway process exposure, synced folder detection, session secret scanning. Maps to OWASP Agentic Top 10 and NIST CSF. Return CRITICAL/WARNING/PASS summary.

Configuration Inspector

bash scripts/config_inspector.sh [--section gateway|channels|agents|tools|sessions|logging|all]
Parse openclaw.json and report security-relevant settings per section with colored recommendations.

Prompt & System Instruction Checker

bash scripts/prompt_checker.sh [--workspace PATH]
Scan AGENTS.md, SOUL.md, USER.md, CLAUDE.md, and other bootstrap files for: missing security guardrails, overly permissive instructions, hardcoded secrets, infrastructure exposure, prompt injection vulnerabilities, and missing identity boundaries.

Session Transcript Scanner

bash scripts/session_scanner.sh [--agent AGENT_ID] [--max-files 20] [--deep]
Scan .jsonl session files for leaked credentials (AWS keys, GitHub PATs, API keys, private keys, bot tokens, Google API keys). With --deep: also check for IP addresses, base64 blobs, file paths, and old files.

Example Output

security_audit.sh (abbreviated):
CODEBLOCK6

config_inspector.sh (abbreviated):
CODEBLOCK7

session_scanner.sh (abbreviated):
CODEBLOCK8

Script Prerequisites & Error Handling

All scripts require bash and standard Unix utilities (grep, awk, wc, stat). If a script fails:

  • - ~/.openclaw not found: Pass --state-dir PATH to point to the actual OpenClaw home, or set OPENCLAW_HOME.
  • jq not installed: config_inspector.sh uses heuristic grep-based parsing and does NOT require jq. Other scripts also avoid jq.
  • Permission denied: Scripts only read files — ensure the current user has read access to ~/.openclaw/. Do not run as root.
  • No session files found: session_scanner.sh looks in agents/*/sessions/*.jsonl. If sessions are stored elsewhere, pass --state-dir.
  • Empty or missing openclaw.json: Scripts will report warnings for missing keys but will not crash. A missing config file is treated as "all defaults."

When to Run Scripts

User RequestScript
"Check my OpenClaw security"INLINECODE95
"Is my config safe?"
config_inspector.sh | | "Review my agent prompts" | prompt_checker.sh | | "Are there leaked secrets?" | session_scanner.sh --deep | | "Full security review" | Run all four in sequence | | "Check for malicious skills" | security_audit.sh (section 9) + openclaw skills scan |

Reference Files

Read these as needed based on the user's task:

  • - Security Hardening — Known CVEs, OWASP Agentic Top 10 mapping, NIST CSF alignment, skill supply chain security, allowlists, sandbox, tool policies, credential management, audit checklist, incident response, prompt injection defense. Read this for ANY security-related question or before recommending config changes.
- Quick lookup: INLINECODE101
  • - Configuration Reference — All config keys, environment variables, channel setup (WhatsApp/Telegram/Discord/Slack/iMessage/Signal/BlueBubbles/etc.), session management, model providers, tools, logging, OPENCLAWHOME.
- Quick lookup: INLINECODE102
  • - Cloud Deployment — Docker, GCP, AWS Bedrock, Fly.io, Railway, Render, Hetzner, Northflank, Nix, Ansible, macOS VM. Network architecture, IAM, volumes, remote access via Tailscale/SSH.
  • - Multi-Agent & Routing — Agent isolation, routing rules, per-agent sandbox/tools, bindings, session scoping, subagents, heartbeat, agent-to-agent communication.

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 clawpilot-1775919542 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 clawpilot-1775919542 技能

通过命令行安装

skillhub install clawpilot-1775919542

下载

⬇ 下载 clawpilot v1.0.0(免费)

文件大小: 49.31 KB | 发布时间: 2026-4-12 09:27

v1.0.0 最新 2026-4-12 09:27
clawpilot 1.0.0 – initial release

- Adds expert guidance for OpenClaw (v2026.2.19): installation, configuration, channel setup, security, and agent management.
- Bundles scripts and documentation for security auditing (CVE checks, supply chain scan), config and prompt inspection, and session transcript review.
- Enforces a security-first workflow: mandates version/CVE checks and reviews on every configuration change, with built-in auto-update check.
- Provides quick reference for major OpenClaw commands and common setup scenarios.
- Covers cloud deployment, remote access options, multi-agent routing, and skill/plugin safety practices.
- Includes architectural overview and secure baseline configuration recommendations.

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部