ClawKit Logo
ClawKitReliability Toolkit
Back to Registry
Official Verified system Safety 4/5

ClawdStrike

Security audit and threat model for OpenClaw gateway hosts. Use to verify OpenClaw configuration, exposure, skills/plugins, filesystem hygiene, and to produce an OK/VULNERABLE report with evidence and fixes.

Why use this skill?

Audit your OpenClaw gateway with ClawdStrike. Identify misconfigurations, verify system security, and receive actionable, deterministic reports on host health.

skill-install — Terminal

Install via CLI (Recommended)

clawhub install openclaw/skills/skills/misirov/clawdstrike
Or

What This Skill Does

ClawdStrike is the primary security audit and threat modeling utility for OpenClaw gateway hosts. Its core function is to systematically scan your deployment to identify misconfigurations, potential attack vectors, and hygiene issues within your local environment. By leveraging a deterministic workflow, ClawdStrike assesses system exposure, audits installed skills and plugins, and verifies filesystem integrity. Instead of relying on heuristic guesses, it executes mandated verification scripts to generate a structured, objective report—classifying your system as either OK or VULNERABLE.

Installation

To integrate this security suite into your OpenClaw environment, execute the following command in your terminal: clawhub install openclaw/skills/skills/misirov/clawdstrike

Use Cases

  • Routine Security Hardening: Schedule periodic audits to ensure your gateway hasn't drifted from your baseline configuration.
  • Post-Plugin Verification: Audit your host after installing new third-party skills to ensure no malicious persistence mechanisms or over-privileged file access paths have been introduced.
  • Compliance Reporting: Generate standardized reports to document the current security posture of your local OpenClaw gateway, complete with evidence-based findings and actionable remediation steps.
  • Incident Response: If you suspect unauthorized system activity, run a deep probe (--deep) to catch anomalies in configuration or runtime context that might indicate a compromise.

Example Prompts

  1. "Run a security audit on this host and provide a summary of any vulnerabilities found."
  2. "Perform a deep probe of the gateway and document the current firewall status and plugin configuration."
  3. "Execute a ClawdStrike audit and provide a report formatted according to the security standards."

Tips & Limitations

  • Safety First: Always review the report output before applying suggested fixes. ClawdStrike is designed to advise, not to automatically mutate your system.
  • Data Privacy: ClawdStrike is built with strict privacy controls. It will never exfiltrate secrets like tokens or cookies. If you see redacted segments, that is the system working exactly as intended to keep your credentials safe.
  • Dependencies: The skill relies heavily on scripts/collect_verified.sh. If this script is missing or corrupted, the skill will be unable to generate a valid report. Always ensure your reference folder is up to date.
  • Scope: This skill is strictly for local gateway audit. It does not perform external vulnerability scanning of your network perimeter.

Metadata

Author@misirov
Stars1401
Views1
Updated2026-02-24
View Author Profile
AI Skill Finder

Not sure this is the right skill?

Describe what you want to build — we'll match you to the best skill from 16,000+ options.

Find the right skill
Add to Configuration

Paste this into your clawhub.json to enable this plugin.

{
  "plugins": {
    "official-misirov-clawdstrike": {
      "enabled": true,
      "auto_update": true
    }
  }
}

Tags(AI)

#security#audit#hardening#devops#safety
Safety Score: 4/5

Flags: file-read, code-execution