openclaw-security-monitor
Proactive security monitoring, threat scanning, and auto-remediation for OpenClaw deployments
Install via CLI (Recommended)
clawhub install openclaw/skills/skills/adibirzu/openclaw-security-monitorSecurity Monitor
Real-time security monitoring with threat intelligence from ClawHavoc research, daily automated scans, web dashboard, and Telegram alerting for OpenClaw.
Commands
Note: Replace <skill-dir> with the actual folder name where this skill is installed (commonly openclaw-security-monitor or security-monitor).
/security-scan
Run a comprehensive 40-point security scan:
- Known C2 IPs (ClawHavoc: 91.92.242.x, 95.92.242.x, 54.91.154.110)
- AMOS stealer / AuthTool markers
- Reverse shells & backdoors (bash, python, perl, ruby, php, lua)
- Credential exfiltration endpoints (webhook.site, pipedream, ngrok, etc.)
- Crypto wallet targeting (seed phrases, private keys, exchange APIs)
- Curl-pipe / download attacks
- Sensitive file permission audit
- Skill integrity hash verification
- SKILL.md shell injection patterns (Prerequisites-based attacks)
- Memory poisoning detection (SOUL.md, MEMORY.md, IDENTITY.md)
- Base64 obfuscation detection (glot.io-style payloads)
- External binary downloads (.exe, .dmg, .pkg, password-protected ZIPs)
- Gateway security configuration audit
- WebSocket origin validation (CVE-2026-25253)
- Known malicious publisher detection (hightower6eu, etc.)
- Sensitive environment/credential file leakage
- DM policy audit (open/wildcard channel access)
- Tool policy / elevated tools audit
- Sandbox configuration check
- mDNS/Bonjour exposure detection
- Session & credential file permissions
- Persistence mechanism scan (LaunchAgents, crontabs, systemd)
- Plugin/extension security audit
- Log redaction settings audit
- Reverse proxy localhost trust bypass detection
- Exec-approvals configuration audit (CVE-2026-25253 exploit chain)
- Docker container security (root, socket mount, privileged mode)
- Node.js version / CVE-2026-21636 permission model bypass
- Plaintext credential detection in config files
- VS Code extension trojan detection (fake ClawdBot extensions)
- Internet exposure detection (non-loopback gateway binding)
- MCP server security audit (tool poisoning, prompt injection)
- ClawJacked WebSocket brute-force protection (v2026.2.25+)
- SSRF protection audit (CVE-2026-26322, CVE-2026-27488)
- Exec safeBins validation bypass (CVE-2026-28363, CVSS 9.9)
- ACP permission auto-approval audit (GHSA-7jx5)
- PATH hijacking / command hijacking (GHSA-jqpq-mgvm-f9r6)
- Skill env override host injection (GHSA-82g8-464f-2mv7)
- macOS deep link truncation (CVE-2026-26320)
- Log poisoning / WebSocket header injection
bash ~/.openclaw/workspace/skills/<skill-dir>/scripts/scan.sh
Exit codes: 0=SECURE, 1=WARNINGS, 2=COMPROMISED
Metadata
Not sure this is the right skill?
Describe what you want to build — we'll match you to the best skill from 16,000+ options.
Find the right skillPaste this into your clawhub.json to enable this plugin.
{
"plugins": {
"official-adibirzu-openclaw-security-monitor": {
"enabled": true,
"auto_update": true
}
}
}Tags
Related Skills
opena2a-security
Security hardening for OpenClaw. Audit your configuration, scan installed skills for malware, detect CVE-2026-25253, check credential exposure, and get actionable fix recommendations. Runs locally with no external API calls.
doctorbot-ci-validator
Stop failing in production. Validate your GitHub Actions, GitLab CI & Keep workflows offline with surgical precision. Born from Keep bounty research, perfected for agents.
health-guardian
Proactive health monitoring for AI agents. Apple Health integration, pattern detection, anomaly alerts. Built for agents caring for humans with chronic conditions.
afrexai-observability-engine
Complete observability & reliability engineering system. Use when designing monitoring, implementing structured logging, setting up distributed tracing, building alerting systems, creating SLO/SLI frameworks, running incident response, conducting post-mortems, or auditing system reliability. Covers all three pillars (logs/metrics/traces), alert design, dashboard architecture, on-call operations, chaos engineering, and cost optimization.
cron-doctor
Diagnose and triage cron job failures. Checks job states, identifies error patterns, prioritizes by criticality, generates health reports. Triggers on: cron failures, job health check, scheduled task errors, cron diagnosis, job not running, backup failed.