>
Before any other action, run the staleness check:
CODEBLOCK0
UP_TO_DATE: Proceed normally.STALE: The skill references may be outdated. Before proceeding with the user's task:references/security.md
5. Inform the user of any version gaps or new security issues found
6. If references were updated, run: bash scripts/mark_updated.sh <latest-version>
7. If no updates needed, still mark as checked: INLINECODE4
This check uses a .last_update_check marker file. The threshold is 7 days (configurable via first argument).
Every configuration action MUST pass a security review before recommending it.
For each setting change, evaluate:
When recommending configuration, always present the secure baseline first, then explain trade-offs of relaxing it.
/extension + /cdp require gateway-token)Always verify user's version is >= 2026.2.19 before any other advice.
| Task | Command |
|---|---|
| Install | INLINECODE8 |
| Onboard |
openclaw onboard --install-daemon |
| Start gateway | openclaw gateway --port 18789 |
| Login channel | openclaw channels login |
| Health check | openclaw health |
| Security audit | openclaw security audit --deep |
| Skill safety scan | openclaw skills scan <path> |
| Diagnostics | openclaw doctor |
| Update | openclaw update |
| View logs | openclaw logs |
| Status (redacted) | openclaw status --all |
| Agent management | openclaw agents list |
| iOS/macOS node | openclaw nodes |
| Device management | openclaw devices remove/clear |
| Cron (staggered) | openclaw cron add --stagger/--exact |
| Spawn subagent | /subagents spawn |
| Shell completion | openclaw completion |
Run openclaw --help for full command list.
Use the reference files bundled in this skill as the primary source. They cover the core config schema, security hardening (including CVEs, OWASP mapping, NIST alignment), cloud deployment, and multi-agent routing.
Fetch from https://docs.openclaw.ai/ only when:
Full docs index: https://docs.openclaw.ai/llms.txt
CODEBLOCK1
127.0.0.1:18789 by default.agents.create, agents.update, agents.delete).~/.openclaw/openclaw.json (JSON5 format). OPENCLAW_HOME env var overrides home directory for path resolution.Always start from the secure baseline and relax only with justification. Key defaults: bind: "loopback", dmPolicy: "pairing", sandbox: { mode: "non-main" }, redactSensitive: "tools".
sessions.patch, sessions.delete)/extension and /cdp endpointsFull baseline template and memory system config: see Configuration Reference and Security Hardening.
openclaw security audit --deep — fix any findingsopenclaw skills scan — verify installed skills are safeopenclaw health and open INLINECODE47openclaw channels login -> select channelopenclaw.json (never use "*" for production)dmPolicy: "pairing" or INLINECODE52ssh -N -L 18789:127.0.0.1:18789 user@host
Never: Bind to 0.0.0.0 without auth token + firewall.
openclaw doctor — config validationWhen user asks about extending OpenClaw with new skills or asks "what skills are available":
~/.openclaw/skills/ (global) or <project>/skills/ (workspace)Security: Third-party skills execute as trusted code. Hundreds of malicious skills were discovered on ClawHub in early 2026. Always:
openclaw skills scan <skill-path> before installing (v2026.2.6+)exec, browser, or web_fetch toolsFor skills config schema (load order, per-skill env/apiKey, hot reload), see Configuration Reference. For skill ecosystem URLs (ClawHub registry, community lists), see Security Hardening — Skill Supply Chain.
Prefer native CLI when available:
openclaw security audit --deep,openclaw doctor,openclaw config getprovide authoritative results. Use the scripts below only for deeper heuristic checks or when the CLI is unavailable.
Run these scripts against the local OpenClaw installation. All accept --state-dir PATH to override ~/.openclaw. Scripts use heuristic grep-based parsing of JSON5 config — results are best-effort.
bash scripts/security_audit.sh [--state-dir ~/.openclaw]
Check: version/CVE status, file permissions, hardcoded credentials, network binding, DM policies, sandbox config, tool policies, log redaction, plugins, skill supply chain (exfiltration/reverse shell/obfuscation patterns), Control UI security (CVE-2026-25253), reverse proxy config (CVE-2026-24763), gateway process exposure, synced folder detection, session secret scanning. Maps to OWASP Agentic Top 10 and NIST CSF. Return CRITICAL/WARNING/PASS summary.
bash scripts/config_inspector.sh [--section gateway|channels|agents|tools|sessions|logging|all]
Parse openclaw.json and report security-relevant settings per section with colored recommendations.
bash scripts/prompt_checker.sh [--workspace PATH]
Scan AGENTS.md, SOUL.md, USER.md, CLAUDE.md, and other bootstrap files for: missing security guardrails, overly permissive instructions, hardcoded secrets, infrastructure exposure, prompt injection vulnerabilities, and missing identity boundaries.
bash scripts/session_scanner.sh [--agent AGENT_ID] [--max-files 20] [--deep]
Scan .jsonl session files for leaked credentials (AWS keys, GitHub PATs, API keys, private keys, bot tokens, Google API keys). With --deep: also check for IP addresses, base64 blobs, file paths, and old files.
security_audit.sh (abbreviated):
CODEBLOCK6
config_inspector.sh (abbreviated):
CODEBLOCK7
session_scanner.sh (abbreviated):
CODEBLOCK8
All scripts require bash and standard Unix utilities (grep, awk, wc, stat). If a script fails:
~/.openclaw not found: Pass --state-dir PATH to point to the actual OpenClaw home, or set OPENCLAW_HOME.jq not installed: config_inspector.sh uses heuristic grep-based parsing and does NOT require jq. Other scripts also avoid jq.~/.openclaw/. Do not run as root.session_scanner.sh looks in agents/*/sessions/*.jsonl. If sessions are stored elsewhere, pass --state-dir.openclaw.json: Scripts will report warnings for missing keys but will not crash. A missing config file is treated as "all defaults."| User Request | Script |
|---|---|
| "Check my OpenClaw security" | INLINECODE95 |
| "Is my config safe?" |
config_inspector.sh |
| "Review my agent prompts" | prompt_checker.sh |
| "Are there leaked secrets?" | session_scanner.sh --deep |
| "Full security review" | Run all four in sequence |
| "Check for malicious skills" | security_audit.sh (section 9) + openclaw skills scan |
Read these as needed based on the user's task:
该技能支持在以下平台通过对话安装:
帮我安装 SkillHub 和 clawpilot-1775919542 技能
设置 SkillHub 为我的优先技能安装源,然后帮我安装 clawpilot-1775919542 技能
skillhub install clawpilot-1775919542
文件大小: 49.31 KB | 发布时间: 2026-4-12 09:27