openclaw / openclaw-hardener
Install for your project team
Run this command in your project directory to install the skill for your entire team:
mkdir -p .claude/skills/openclaw-hardener && curl -L -o skill.zip "https://fastmcp.me/Skills/Download/2135" && unzip -o skill.zip -d .claude/skills/openclaw-hardener && rm skill.zip
Project Skills
This skill will be saved in .claude/skills/openclaw-hardener/ and checked into git. All team members will have access to it automatically.
Important: Please verify the skill by reviewing its instructions before using it.
Harden OpenClaw (workspace + ~/.openclaw): run openclaw security audit, catch prompt-injection/exfil risks, scan for secrets, and apply safe fixes (chmod/exec-bit cleanup). Includes optional config.patch planning to reduce attack surface.
0 views
0 installs
Skill Content
--- name: openclaw-hardener description: "Harden OpenClaw (workspace + ~/.openclaw): run openclaw security audit, catch prompt-injection/exfil risks, scan for secrets, and apply safe fixes (chmod/exec-bit cleanup). Includes optional config.patch planning to reduce attack surface." --- # OpenClaw Hardener This skill provides a **user-choice** hardening tool that can: - Run OpenClaw’s built-in security audit (`openclaw security audit --deep` / `--fix`). - Run workspace hygiene checks (exec bits, stray `.env`, unsafe serialization patterns, etc.). - Apply safe mechanical fixes **only when explicitly requested**. - Generate (and optionally apply) a **Gateway `config.patch` plan** to tighten runtime policy. ## Run the tool Script: - `skills_live/openclaw-hardener/scripts/hardener.py` Examples: ```bash # Read-only checks (recommended default) python3 skills_live/openclaw-hardener/scripts/hardener.py check --all # Only run OpenClaw built-in audit (deep) python3 skills_live/openclaw-hardener/scripts/hardener.py check --openclaw # Only run workspace checks python3 skills_live/openclaw-hardener/scripts/hardener.py check --workspace # Apply safe fixes (chmod/exec-bit cleanup + optionally openclaw audit --fix) python3 skills_live/openclaw-hardener/scripts/hardener.py fix --all # Generate a config.patch plan (prints JSON5 patch) python3 skills_live/openclaw-hardener/scripts/hardener.py plan-config # Apply the plan (requires a running gateway; uses `openclaw gateway call`) python3 skills_live/openclaw-hardener/scripts/hardener.py apply-config ``` ## Design rules (do not violate) - **Default = check-only.** No file/config changes unless user runs `fix` or `apply-config`. - **No secrets in output.** If a check reads sensitive paths, it must redact likely tokens. - **Patch plans must be explicit.** Always show the patch before applying. ## What it checks / fixes ### OpenClaw built-in security audit - Runs `openclaw security audit --deep` (and `--fix` in fix mode). ### Workspace hygiene (scope: workspace + ~/.openclaw) - Permissions sanity under `~/.openclaw` (basic checks). - Unexpected executable bits in non-executable filetypes. - Stray `.env` files (warn) and tracked `.env` (fail). - Risky deserialization / unsafe patterns in our scripts (heuristics). ### Config hardening (optional plan) Generates a conservative `config.patch` template focusing on: - Tightening inbound access defaults (pairing/allowlist, mention gating) **only if you opt-in**. - Ensuring sensitive log redaction is enabled. (Exact keys depend on your config; the plan is best-effort and should be reviewed.)