ClawKit Logo
ClawKitReliability Toolkit
Back to Registry
Official Verified

clawshield

OpenClaw security audit + prompt injection detector. Scans gateway/vulns/cron/PI patterns. Use for frenzy-proofing installs.

skill-install — Terminal

Install via CLI (Recommended)

clawhub install openclaw/skills/skills/poolguy24/clawshield
Or

ClawShield

Purpose

Audit a local OpenClaw install for security posture and common prompt-injection indicators. Produces a JSON report for review and alerting.

Workflow

  1. Canvas present: Launch the panel server and present the UI.
  2. User config: Update config.yaml (scan frequency, alerts, sensitivity).
  3. Cron setup: Schedule scripts/audit.sh at the chosen cadence.
  4. Report/Alert: Review JSON output and alert if prompt-injection hits or unexpected open ports are found.

Usage

Panel (recommended)

node scripts/panel-server.js

Then present the UI:

  • canvas.presenthttp://localhost:8133 (Scan / Settings / Logs)

Config (CLI)

node scripts/config.js get
node scripts/config.js set Scan_freq daily alerts telegram sensitivity high

Audit (CLI)

bash scripts/audit.sh > report.json

Notes

  • Local-only scans; no network calls outside localhost.
  • Panel server is local and stores the last report at logs/last-report.json.
  • config.yaml defaults: Scan_freq=daily, alerts=telegram, sensitivity=high.
  • Safe for routine security checks and “frenzy-proofing”.

Contact: Jeffrey Coleman | [email protected] | Custom audits/enterprise.

Metadata

Author@poolguy24
Stars1217
Views0
Updated2026-02-20
View Author Profile
AI Skill Finder

Not sure this is the right skill?

Describe what you want to build — we'll match you to the best skill from 16,000+ options.

Find the right skill
Add to Configuration

Paste this into your clawhub.json to enable this plugin.

{
  "plugins": {
    "official-poolguy24-clawshield": {
      "enabled": true,
      "auto_update": true
    }
  }
}
Safety NoteClawKit audits metadata but not runtime behavior. Use with caution.