openclaw-sec

40
3
Source

AI Agent Security Suite - Real-time protection against prompt injection, command injection, SSRF, path traversal, secrets exposure, and content policy violations

Install

mkdir -p .claude/skills/openclaw-sec && curl -L -o skill.zip "https://mcp.directory/api/skills/download/1850" && unzip -o skill.zip -d .claude/skills/openclaw-sec && rm skill.zip

Installs to .claude/skills/openclaw-sec

About this skill

OpenClaw Security Suite

Comprehensive AI Agent Protection - Real-time security validation with 6 parallel detection modules, intelligent severity scoring, and automated action enforcement.

Overview

OpenClaw Security Suite protects AI agent systems from security threats through:

  • 6 Parallel Detection Modules - Comprehensive threat coverage
  • Sub-50ms Validation - Real-time with async database writes
  • 🎯 Smart Severity Scoring - Context-aware risk assessment
  • 🔧 Automated Actions - Block, warn, or log based on severity
  • 📊 Analytics & Reputation - Track patterns and user behavior
  • 🪝 Auto-Hooks - Transparent protection via hooks

Architecture

┌─────────────────────────────────────────────────────────────┐
│                    User Input / Tool Call                    │
└──────────────────────────┬──────────────────────────────────┘
                           │
                           ▼
         ┌─────────────────────────────────┐
         │      Security Engine (Main)      │
         │    • Orchestrates all modules    │
         │    • Aggregates findings         │
         │    • Determines actions          │
         └────────────┬────────────────────┘
                      │
        ┌─────────────┴──────────────┐
        │   Parallel Detection (6)    │
        └─────────────┬───────────────┘
                      │
    ┌─────┬─────┬────┴────┬─────┬─────┐
    ▼     ▼     ▼         ▼     ▼     ▼
  Prompt Command URL    Path Secret Content
  Inject Inject  Valid  Valid Detect Scanner
    ↓     ↓      ↓      ↓     ↓      ↓
    └─────┴──────┴──────┴─────┴──────┘
                      │
                      ▼
         ┌────────────────────────┐
         │   Severity Scorer       │
         │ • Calculates risk level │
         │ • Weights by module     │
         └────────┬───────────────┘
                  │
                  ▼
         ┌────────────────────────┐
         │    Action Engine        │
         │ • Rate limiting         │
         │ • Reputation scoring    │
         │ • Action determination  │
         └────────┬───────────────┘
                  │
        ┌─────────┴─────────┐
        ▼                   ▼
   ┌─────────┐       ┌──────────────┐
   │ Return  │       │ Async Queue  │
   │ Result  │       │ • DB writes  │
   │ ~20-50ms│       │ • Logging    │
   └─────────┘       │ • Notify     │
                     └──────────────┘

Commands

All commands are available via the /openclaw-sec skill or openclaw-sec CLI.

Validation Commands

/openclaw-sec validate-command <command>

Validate a shell command for injection attempts.

openclaw-sec validate-command "ls -la"
openclaw-sec validate-command "rm -rf / && malicious"

Options:

  • -u, --user-id <id> - User ID for tracking
  • -s, --session-id <id> - Session ID for tracking

Example Output:

Validating command: rm -rf /

Severity: HIGH
Action: block
Findings: 2

Detections:
  1. command_injection - Dangerous command pattern detected
     Matched: rm -rf /

Recommendations:
  • Validate and sanitize any system commands
  • Use parameterized commands instead of string concatenation

/openclaw-sec check-url <url>

Validate a URL for SSRF and security issues.

openclaw-sec check-url "https://example.com"
openclaw-sec check-url "http://169.254.169.254/metadata"
openclaw-sec check-url "file:///etc/passwd"

Options:

  • -u, --user-id <id> - User ID
  • -s, --session-id <id> - Session ID

Detects:

  • Internal/private IP addresses (RFC 1918, link-local)
  • Cloud metadata endpoints (AWS, Azure, GCP)
  • Localhost and loopback addresses
  • File protocol URIs
  • Credential exposure in URLs

/openclaw-sec validate-path <path>

Validate a file path for traversal attacks.

openclaw-sec validate-path "/tmp/safe-file.txt"
openclaw-sec validate-path "../../../etc/passwd"
openclaw-sec validate-path "/proc/self/environ"

Options:

  • -u, --user-id <id> - User ID
  • -s, --session-id <id> - Session ID

Detects:

  • Directory traversal patterns (../, ..\\)
  • Absolute path to sensitive files (/etc/passwd, /proc/*)
  • Null byte injection
  • Unicode/encoding tricks
  • Windows UNC paths

/openclaw-sec scan-content <text|file>

Scan content for secrets, obfuscation, and policy violations.

openclaw-sec scan-content "Normal text here"
openclaw-sec scan-content --file ./document.txt
openclaw-sec scan-content "API_KEY=sk-abc123def456"

Options:

  • -f, --file - Treat argument as file path
  • -u, --user-id <id> - User ID
  • -s, --session-id <id> - Session ID

Detects:

  • API keys and tokens (OpenAI, AWS, GitHub, etc.)
  • Database credentials
  • SSH private keys
  • JWT tokens
  • Base64/hex obfuscation
  • Excessive special characters
  • Policy violations

/openclaw-sec check-all <text>

Run comprehensive security scan with all modules.

openclaw-sec check-all "Your input text here"

Options:

  • -u, --user-id <id> - User ID
  • -s, --session-id <id> - Session ID

Example Output:

Running comprehensive security scan...
──────────────────────────────────────

📊 Scan Results
Severity: MEDIUM
Action: warn
Fingerprint: a1b2c3d4e5f6g7h8
Total Findings: 3

🔍 Detections by Module:

  prompt_injection (2 findings)
    1. instruction_override
       Severity: MEDIUM
       Description: Attempt to override system instructions

  url_validator (1 findings)
    1. ssrf_private_ip
       Severity: HIGH
       Description: Internal IP address detected

Monitoring Commands

/openclaw-sec events

View recent security events.

openclaw-sec events
openclaw-sec events --limit 50
openclaw-sec events --user-id "[email protected]"
openclaw-sec events --severity HIGH

Options:

  • -l, --limit <number> - Number of events (default: 20)
  • -u, --user-id <id> - Filter by user
  • -s, --severity <level> - Filter by severity

Output:

📋 Security Events

Timestamp            Severity   Action       User ID          Module
────────────────────────────────────────────────────────────────────
2026-02-01 10:30:22  HIGH       block        [email protected]   command_validator
2026-02-01 10:29:15  MEDIUM     warn         [email protected]     url_validator
2026-02-01 10:28:03  LOW        log          [email protected]  prompt_injection

/openclaw-sec stats

Show security statistics.

openclaw-sec stats

Output:

📊 Security Statistics

Database Tables:
  • security_events
  • rate_limits
  • user_reputation
  • attack_patterns
  • notifications_log

/openclaw-sec analyze

Analyze security patterns and trends.

openclaw-sec analyze
openclaw-sec analyze --user-id "[email protected]"

Options:

  • -u, --user-id <id> - Analyze specific user

Output:

🔬 Security Analysis

User Reputation:
  Trust Score: 87.5
  Total Requests: 1,234
  Blocked Attempts: 5
  Allowlisted: No
  Blocklisted: No

/openclaw-sec reputation <user-id>

View user reputation and trust score.

openclaw-sec reputation "[email protected]"

Output:

👤 User Reputation

User ID: [email protected]
Trust Score: 92.3
Total Requests: 5,678
Blocked Attempts: 12
✓ Allowlisted
Last Violation: 2026-01-15 14:22:00

/openclaw-sec watch

Watch for security events in real-time (placeholder).

openclaw-sec watch

Configuration Commands

/openclaw-sec config

Show current configuration.

openclaw-sec config

Output:

⚙️  Configuration

Config File: .openclaw-sec.yaml

Status: Enabled
Sensitivity: medium
Database: .openclaw-sec.db

Modules:
  ✓ prompt_injection
  ✓ command_validator
  ✓ url_validator
  ✓ path_validator
  ✓ secret_detector
  ✓ content_scanner

Actions:
  SAFE: allow
  LOW: log
  MEDIUM: warn
  HIGH: block
  CRITICAL: block_notify

/openclaw-sec config-set <key> <value>

Update configuration value (placeholder).

openclaw-sec config-set sensitivity strict

Testing Commands

/openclaw-sec test

Test security configuration with predefined test cases.

openclaw-sec test

Output:

🧪 Testing Security Configuration

✓ PASS Safe input
  Expected: SAFE
  Got: SAFE
  Action: allow

✗ FAIL Command injection
  Expected: HIGH
  Got: MEDIUM
  Action: warn

📊 Test Results:
  Passed: 3
  Failed: 1

/openclaw-sec report

Generate security report (placeholder).

openclaw-sec report
openclaw-sec report --format json
openclaw-sec report --output report.txt

Options:

  • -f, --format <type> - Report format (text, json)
  • -o, --output <file> - Output file

Database Commands

/openclaw-sec db-vacuum

Optimize database with VACUUM.

openclaw-sec db-vacuum

Output:

Optimizing database...
✓ Database optimized

Configuration

Configuration file: .openclaw-sec.yaml

Example Configuration

openclaw_security:
  # Master enable/disable
  enabled: true

  # Global sensitivity level
  # Options: paranoid | strict | medium | permissive
  sensitivity: medium

  # Owner user IDs (bypass all checks)
  owner_ids:
    - "[email protected]"
    - "[email protected]"

  # Module configuration
  modules:
    prompt_injection:
      enabled: true
      sensitivity: strict  # Override global sensitivity

    command_validator:
      enabled: true
      sensitivity: paranoid

    url_validator:
      enabled: true
      sensitivity: medium

    path_validator:
      enabled: true
      sensitivity: strict

    secret_detector:
      enabled: true
      sensitivity: medium

    content_scanner:
      enabled: true
      sensitivity: medium

  # Action mapping by severity
  actions:
    SAFE: allow
    LOW: log
    MEDIUM: warn
    HIGH: block
    CRITICAL: block_notify

  # Rate limiting
  rate_limit:
 

---

*Content truncated.*

You might also like

flutter-development

aj-geddes

Build beautiful cross-platform mobile apps with Flutter and Dart. Covers widgets, state management with Provider/BLoC, navigation, API integration, and material design.

1,5711,369

ui-ux-pro-max

nextlevelbuilder

"UI/UX design intelligence. 50 styles, 21 palettes, 50 font pairings, 20 charts, 8 stacks (React, Next.js, Vue, Svelte, SwiftUI, React Native, Flutter, Tailwind). Actions: plan, build, create, design, implement, review, fix, improve, optimize, enhance, refactor, check UI/UX code. Projects: website, landing page, dashboard, admin panel, e-commerce, SaaS, portfolio, blog, mobile app, .html, .tsx, .vue, .svelte. Elements: button, modal, navbar, sidebar, card, table, form, chart. Styles: glassmorphism, claymorphism, minimalism, brutalism, neumorphism, bento grid, dark mode, responsive, skeuomorphism, flat design. Topics: color palette, accessibility, animation, layout, typography, font pairing, spacing, hover, shadow, gradient."

1,1161,191

drawio-diagrams-enhanced

jgtolentino

Create professional draw.io (diagrams.net) diagrams in XML format (.drawio files) with integrated PMP/PMBOK methodologies, extensive visual asset libraries, and industry-standard professional templates. Use this skill when users ask to create flowcharts, swimlane diagrams, cross-functional flowcharts, org charts, network diagrams, UML diagrams, BPMN, project management diagrams (WBS, Gantt, PERT, RACI), risk matrices, stakeholder maps, or any other visual diagram in draw.io format. This skill includes access to custom shape libraries for icons, clipart, and professional symbols.

1,4181,109

godot

bfollington

This skill should be used when working on Godot Engine projects. It provides specialized knowledge of Godot's file formats (.gd, .tscn, .tres), architecture patterns (component-based, signal-driven, resource-based), common pitfalls, validation tools, code templates, and CLI workflows. The `godot` command is available for running the game, validating scripts, importing resources, and exporting builds. Use this skill for tasks involving Godot game development, debugging scene/resource files, implementing game systems, or creating new Godot components.

1,194747

nano-banana-pro

garg-aayush

Generate and edit images using Google's Nano Banana Pro (Gemini 3 Pro Image) API. Use when the user asks to generate, create, edit, modify, change, alter, or update images. Also use when user references an existing image file and asks to modify it in any way (e.g., "modify this image", "change the background", "replace X with Y"). Supports both text-to-image generation and image-to-image editing with configurable resolution (1K default, 2K, or 4K for high resolution). DO NOT read the image file first - use this skill directly with the --input-image parameter.

1,154684

pdf-to-markdown

aliceisjustplaying

Convert entire PDF documents to clean, structured Markdown for full context loading. Use this skill when the user wants to extract ALL text from a PDF into context (not grep/search), when discussing or analyzing PDF content in full, when the user mentions "load the whole PDF", "bring the PDF into context", "read the entire PDF", or when partial extraction/grepping would miss important context. This is the preferred method for PDF text extraction over page-by-page or grep approaches.

1,312614

Stay ahead of the MCP ecosystem

Get weekly updates on new skills and servers.