skills$openclaw/openclaw-triage
atlaspa3.6k

by atlaspa

openclaw-triage – OpenClaw Skill

openclaw-triage is an OpenClaw Skills integration for coding workflows. Incident response and forensics for agent workspaces. Investigate compromises, build timelines, assess blast radius, and collect evidence. Cross-references data from warden, ledger, signet, and sentinel for unified analysis. Free alert layer — upgrade to openclaw-triage-pro for automated containment, remediation playbooks, and evidence export.

3.6k stars7.6k forksSecurity L1
Updated Feb 7, 2026Created Feb 7, 2026coding

Skill Snapshot

nameopenclaw-triage
descriptionIncident response and forensics for agent workspaces. Investigate compromises, build timelines, assess blast radius, and collect evidence. Cross-references data from warden, ledger, signet, and sentinel for unified analysis. Free alert layer — upgrade to openclaw-triage-pro for automated containment, remediation playbooks, and evidence export. OpenClaw Skills integration.
owneratlaspa
repositoryatlaspa/openclaw-triage
languageMarkdown
licenseMIT
topics
securityL1
installopenclaw add @atlaspa/openclaw-triage
last updatedFeb 7, 2026

Maintainer

atlaspa

atlaspa

Maintains openclaw-triage in the OpenClaw Skills directory.

View GitHub profile
File Explorer
5 files
.
scripts
triage.py
42.4 KB
_meta.json
283 B
README.md
5.3 KB
SKILL.md
4.9 KB
SKILL.md

name: openclaw-triage description: "Incident response and forensics for agent workspaces. Investigate compromises, build timelines, assess blast radius, and collect evidence. Cross-references data from warden, ledger, signet, and sentinel for unified analysis. Free alert layer — upgrade to openclaw-triage-pro for automated containment, remediation playbooks, and evidence export." user-invocable: true metadata: {"openclaw":{"emoji":"🚨","requires":{"bins":["python3"]},"os":["darwin","linux","win32"]}}

OpenClaw Triage

Incident response and forensics for agent workspaces. When something goes wrong — a skill behaves unexpectedly, files change without explanation, or another security tool flags an anomaly — triage investigates what happened, assesses the damage, and guides recovery.

This is the "detective" that pulls together evidence from all OpenClaw security tools into a unified incident report.

Need automated containment and remediation? Upgrade to openclaw-triage-pro for quarantine, playbooks, evidence chain-of-custody, and post-incident hardening.

Commands

Full Investigation

Run a comprehensive incident investigation. Collects workspace state, checks for signs of compromise (recently modified critical files, new skills, unusual permissions, off-hours modifications, large files, hidden files), cross-references with warden/ledger/signet/sentinel data, builds an event timeline, and calculates an incident severity score (CRITICAL / HIGH / MEDIUM / LOW).

python3 {baseDir}/scripts/triage.py investigate --workspace /path/to/workspace

Event Timeline

Build a chronological timeline of all file modifications in the workspace. Groups events by hour, highlights suspicious burst activity (many files modified in a short window), shows which directories and skills were affected, and cross-references with ledger entries if available.

python3 {baseDir}/scripts/triage.py timeline --workspace /path/to/workspace

Look back further than the default 24 hours:

python3 {baseDir}/scripts/triage.py timeline --hours 72 --workspace /path/to/workspace

Blast Radius (Scope)

Assess the blast radius of a potential compromise. Categorizes all files by risk level (critical, memory, skill, config), checks for credential exposure patterns in recently modified files, scans for outbound exfiltration URLs, and estimates scope as CONTAINED (single area), SPREADING (multiple skills), or SYSTEMIC (workspace-level).

python3 {baseDir}/scripts/triage.py scope --workspace /path/to/workspace

Evidence Collection

Collect and preserve forensic evidence before remediation. Snapshots the full workspace state (file list with SHA-256 hashes, sizes, timestamps), copies all available security tool data (.integrity/, .ledger/, .signet/, .sentinel/), and generates a summary report. Always run this before any remediation to preserve the forensic trail.

python3 {baseDir}/scripts/triage.py evidence --workspace /path/to/workspace

Save to a custom output directory:

python3 {baseDir}/scripts/triage.py evidence --output /path/to/evidence/dir --workspace /path/to/workspace

Quick Status

One-line summary of triage state: last investigation timestamp, current threat level, and whether evidence has been collected.

python3 {baseDir}/scripts/triage.py status --workspace /path/to/workspace

Workspace Auto-Detection

If --workspace is omitted, the script tries:

  1. OPENCLAW_WORKSPACE environment variable
  2. Current directory (if AGENTS.md exists)
  3. ~/.openclaw/workspace (default)

Cross-Reference Sources

Triage automatically checks for data from these OpenClaw tools:

ToolData PathWhat Triage Checks
Warden.integrity/manifest.jsonBaseline deviations — files modified since last known-good state
Ledger.ledger/chain.jsonlChain breaks, unparseable entries, suspicious log entries
Signet.signet/manifest.jsonTampered skill signatures — skills modified after signing
Sentinel.sentinel/threats.jsonKnown threats and high-severity findings

Incident Severity Levels

LevelMeaningTrigger
CRITICALImmediate response requiredAny critical finding, or 3+ high findings
HIGHInvestigation warrantedHigh-severity findings from any source
MEDIUMReview recommendedMultiple medium findings or volume threshold
LOWNo immediate actionInformational findings only

Exit Codes

  • 0 — Clean, no actionable findings
  • 1 — Findings detected (investigation recommended)
  • 2 — Critical findings (immediate action needed)

No External Dependencies

Python standard library only. No pip install. No network calls. Everything runs locally.

Cross-Platform

Works with OpenClaw, Claude Code, Cursor, and any tool using the Agent Skills specification.

README.md

OpenClaw Triage

Free incident response and forensics for OpenClaw, Claude Code, and any Agent Skills-compatible tool.

Investigates compromises, builds event timelines, assesses blast radius, and collects forensic evidence — pulling together data from warden, ledger, signet, and sentinel into unified incident reports.

Looking for automated containment and remediation? See openclaw-triage-pro for quarantine, playbooks, evidence chain-of-custody, and post-incident hardening.

The Problem

When something goes wrong in an agent workspace — unexpected file changes, anomalous skill behavior, or a security tool flags an alert — you need to quickly understand what happened, how far it spread, and what to do about it.

Existing OpenClaw security tools each monitor one dimension: warden watches file integrity, ledger tracks the audit chain, signet verifies skill signatures, sentinel scans for threats. But no single tool correlates all of that data into a coherent incident picture.

Triage is the detective that ties it all together.

Install

# Clone
git clone https://github.com/AtlasPA/openclaw-triage.git

# Copy to your workspace skills directory
cp -r openclaw-triage ~/.openclaw/workspace/skills/

Usage

# Full incident investigation
python3 scripts/triage.py investigate

# Build event timeline (last 24 hours)
python3 scripts/triage.py timeline

# Timeline with custom window
python3 scripts/triage.py timeline --hours 72

# Assess blast radius
python3 scripts/triage.py scope

# Collect forensic evidence
python3 scripts/triage.py evidence

# Evidence to custom directory
python3 scripts/triage.py evidence --output /path/to/dir

# Quick status check
python3 scripts/triage.py status

All commands accept --workspace /path/to/workspace. If omitted, auto-detects from $OPENCLAW_WORKSPACE, current directory, or ~/.openclaw/workspace.

What It Does

Investigate

Runs a comprehensive incident investigation:

  • Workspace inventory — Collects file hashes, modification times, and sizes for every file
  • Compromise indicators — Checks for recently modified critical files (SOUL.md, AGENTS.md, etc.), new/modified skills, off-hours modifications, large files, and hidden files
  • Cross-reference — Pulls data from warden (baseline deviations), ledger (chain breaks), signet (tampered signatures), and sentinel (known threats)
  • Timeline — Builds a summary of recent events based on file modification times
  • Severity scoring — Calculates an overall incident severity: CRITICAL, HIGH, MEDIUM, or LOW

Timeline

Builds a detailed chronological view of workspace activity:

  • Lists all file modifications grouped by hour
  • Highlights suspicious burst activity (many files modified in a short window)
  • Shows which directories and skills were affected
  • Cross-references with ledger entries if available

Scope

Assesses the blast radius of a potential compromise:

  • Categorizes all files by risk: critical workspace files, memory files, skill files, config files
  • Scans recently modified files for credential exposure patterns (API keys, tokens, AWS keys)
  • Scans for outbound exfiltration URLs (ngrok, webhook.site, raw IPs, etc.)
  • Estimates scope level: CONTAINED, SPREADING, or SYSTEMIC

Evidence Collection

Preserves forensic data before remediation:

  • Snapshots full workspace state (file list with SHA-256 hashes, sizes, timestamps)
  • Copies all security tool data (.integrity/, .ledger/, .signet/, .sentinel/)
  • Generates a collection summary
  • Saves everything to .triage/evidence-{timestamp}/ or a custom directory

Always run evidence collection before any remediation to preserve the forensic trail.

Status

Quick check of triage state: last investigation timestamp, current threat level, and whether evidence has been collected.

Cross-Reference Sources

ToolData PathWhat Triage Checks
Warden.integrity/manifest.jsonBaseline deviations
Ledger.ledger/chain.jsonlChain breaks, suspicious entries
Signet.signet/manifest.jsonTampered skill signatures
Sentinel.sentinel/threats.jsonKnown threats

Exit Codes

CodeMeaning
0Clean, no actionable findings
1Findings detected (investigation recommended)
2Critical findings (immediate action needed)

Free vs Pro

FeatureFreePro
Full investigationYesYes
Event timelineYesYes
Blast radius assessmentYesYes
Evidence collectionYesYes
Cross-reference (warden, ledger, signet, sentinel)YesYes
Severity scoringYesYes
Automated containment (quarantine affected skills)-Yes
Critical file restore from backup-Yes
Remediation playbooks-Yes
Evidence chain-of-custody-Yes
Incident report export (JSON, HTML)-Yes
Integration hooks with all OpenClaw tools-Yes
Post-incident hardening recommendations-Yes

Requirements

  • Python 3.8+
  • No external dependencies (stdlib only)
  • Cross-platform: Windows, macOS, Linux

License

MIT

Permissions & Security

Security level L1: Low-risk skills with minimal permissions. Review inputs and outputs before running in production.

Requirements

  • OpenClaw CLI installed and configured.
  • Language: Markdown
  • License: MIT
  • Topics:

FAQ

How do I install openclaw-triage?

Run openclaw add @atlaspa/openclaw-triage in your terminal. This installs openclaw-triage into your OpenClaw Skills catalog.

Does this skill run locally or in the cloud?

OpenClaw Skills execute locally by default. Review the SKILL.md and permissions before running any skill.

Where can I verify the source code?

The source repository is available at https://github.com/openclaw/skills/tree/main/skills/atlaspa/openclaw-triage. Review commits and README documentation before installing.