ClawdStrike
Security audit and threat model for OpenClaw gateway hosts. Use to verify OpenClaw configuration, exposure, skills/plugins, filesystem hygiene, and to produce an OK/VULNERABLE report with evidence and fixes.
Why use this skill?
Audit your OpenClaw gateway with ClawdStrike. Identify misconfigurations, verify system security, and receive actionable, deterministic reports on host health.
Install via CLI (Recommended)
clawhub install openclaw/skills/skills/misirov/clawdstrikeWhat This Skill Does
ClawdStrike is the primary security audit and threat modeling utility for OpenClaw gateway hosts. Its core function is to systematically scan your deployment to identify misconfigurations, potential attack vectors, and hygiene issues within your local environment. By leveraging a deterministic workflow, ClawdStrike assesses system exposure, audits installed skills and plugins, and verifies filesystem integrity. Instead of relying on heuristic guesses, it executes mandated verification scripts to generate a structured, objective report—classifying your system as either OK or VULNERABLE.
Installation
To integrate this security suite into your OpenClaw environment, execute the following command in your terminal:
clawhub install openclaw/skills/skills/misirov/clawdstrike
Use Cases
- Routine Security Hardening: Schedule periodic audits to ensure your gateway hasn't drifted from your baseline configuration.
- Post-Plugin Verification: Audit your host after installing new third-party skills to ensure no malicious persistence mechanisms or over-privileged file access paths have been introduced.
- Compliance Reporting: Generate standardized reports to document the current security posture of your local OpenClaw gateway, complete with evidence-based findings and actionable remediation steps.
- Incident Response: If you suspect unauthorized system activity, run a deep probe (
--deep) to catch anomalies in configuration or runtime context that might indicate a compromise.
Example Prompts
- "Run a security audit on this host and provide a summary of any vulnerabilities found."
- "Perform a deep probe of the gateway and document the current firewall status and plugin configuration."
- "Execute a ClawdStrike audit and provide a report formatted according to the security standards."
Tips & Limitations
- Safety First: Always review the report output before applying suggested fixes. ClawdStrike is designed to advise, not to automatically mutate your system.
- Data Privacy: ClawdStrike is built with strict privacy controls. It will never exfiltrate secrets like tokens or cookies. If you see redacted segments, that is the system working exactly as intended to keep your credentials safe.
- Dependencies: The skill relies heavily on
scripts/collect_verified.sh. If this script is missing or corrupted, the skill will be unable to generate a valid report. Always ensure your reference folder is up to date. - Scope: This skill is strictly for local gateway audit. It does not perform external vulnerability scanning of your network perimeter.
Metadata
Not sure this is the right skill?
Describe what you want to build — we'll match you to the best skill from 16,000+ options.
Find the right skillPaste this into your clawhub.json to enable this plugin.
{
"plugins": {
"official-misirov-clawdstrike": {
"enabled": true,
"auto_update": true
}
}
}Tags(AI)
Flags: file-read, code-execution
Related Skills
clawstrike
Security audit and threat model for OpenClaw gateway hosts. Use to verify OpenClaw configuration, exposure, skills/plugins, filesystem hygiene, and to produce an OK/VULNERABLE report with evidence and fixes.
clawstrike
Security audit and threat model for OpenClaw gateway hosts. Use to verify OpenClaw configuration, exposure, skills/plugins, filesystem hygiene, and to produce an OK/VULNERABLE report with evidence and fixes.
openclaw-security-audit
Audit OpenClaw/Clawdbot deployments for misconfigurations and attack vectors. Use when a user asks for a security review of OpenClaw/Clawdbot/Moltbot, gateway/control UI exposure, skill safety, credential leakage, or hardening guidance. Produces a terminal report with OK/VULNERABLE findings and fixes.