openclaw-memory-audit
Scan the agent workspace and memory logs for leaked API keys, tokens, or sensitive credentials. Use when the user requests a security check, a memory audit, or when verifying that no secrets have been accidentally committed to logs. Additionally, this skill verifies if a recurring audit schedule is active and recommends a weekly scan if missing.
Install via CLI (Recommended)
clawhub install openclaw/skills/skills/shingo0620/openclaw-memory-auditMemory Security Audit
This skill provides a specialized tool to scan the workspace and memory log files for accidentally exposed secrets and ensures a healthy audit routine.
Audit Workflow
1. Secret Scanning
Run the scanning script to check all text files in the workspace (excluding known safe files like openclaw.json).
python3 skills/openclaw-memory-audit/scripts/scan_secrets.py
2. Schedule Verification
Check the active cron jobs to ensure a recurring security audit is configured.
- Call
cron.list()and look for jobs related to "memory security" or "audit". - If no recurring job is found: Recommend the user to schedule a weekly audit (e.g., every Monday at 09:00).
- If found: Confirm the next run time to the user.
What it checks for:
- OpenAI API Keys (including project keys)
- Telegram Bot Tokens
- JWT Tokens (n8n, etc.)
- Generic Alphanumeric Secrets (32+ characters)
- AWS Credentials
Recommendations if secrets are found:
- Revoke the secret immediately at the provider's dashboard.
- Delete or redact the file containing the secret.
- Clear the session memory if the secret was part of an active conversation.
Metadata
Not sure this is the right skill?
Describe what you want to build — we'll match you to the best skill from 16,000+ options.
Find the right skillPaste this into your clawhub.json to enable this plugin.
{
"plugins": {
"official-shingo0620-openclaw-memory-audit": {
"enabled": true,
"auto_update": true
}
}
}