skills$openclaw/security-audit
virtaava2.7k

by virtaava

security-audit – OpenClaw Skill

security-audit is an OpenClaw Skills integration for security workflows. Fail-closed security auditing for OpenClaw/ClawHub skills & repos: trufflehog secrets scanning, semgrep SAST, prompt-injection/persistence signals, and supply-chain hygiene checks before enabling or installing.

2.7k stars7.7k forksSecurity L1
Updated Feb 7, 2026Created Feb 7, 2026security

Skill Snapshot

namesecurity-audit
descriptionFail-closed security auditing for OpenClaw/ClawHub skills & repos: trufflehog secrets scanning, semgrep SAST, prompt-injection/persistence signals, and supply-chain hygiene checks before enabling or installing. OpenClaw Skills integration.
ownervirtaava
repositoryvirtaava/sona-security-audit
languageMarkdown
licenseMIT
topics
securityL1
installopenclaw add @virtaava/sona-security-audit
last updatedFeb 7, 2026

Maintainer

virtaava

virtaava

Maintains security-audit in the OpenClaw Skills directory.

View GitHub profile
File Explorer
12 files
.
docs
OPENCLAW_SKILL_MANIFEST_SCHEMA.md
925 B
README_ZERO_TRUST_INSTALL.md
1.3 KB
scripts
hostile_audit.py
12.8 KB
run_audit_json.sh
2.4 KB
security_audit.sh
1.0 KB
_meta.json
648 B
CHANGELOG.md
538 B
openclaw-skill.json
1.1 KB
README.md
575 B
SKILL.md
3.4 KB
SKILL.md

name: security-audit description: "Fail-closed security auditing for OpenClaw/ClawHub skills & repos: trufflehog secrets scanning, semgrep SAST, prompt-injection/persistence signals, and supply-chain hygiene checks before enabling or installing." metadata: {"openclaw":{"emoji":"🛡️","requires":{"bins":["jq","trufflehog","semgrep","python3"]},"install":[{"id":"apt-jq","kind":"apt","package":"jq","bins":["jq"],"label":"Install jq (apt)"},{"id":"apt-ghog","kind":"apt","package":"python3","bins":["python3"],"label":"Install Python 3 (apt)"},{"id":"apt-trufflehog","kind":"apt","package":"trufflehog","bins":["trufflehog"],"label":"Install trufflehog (apt)"},{"id":"pipx-semgrep","kind":"shell","label":"Install semgrep (pipx)","command":"python3 -m pip install --user pipx && python3 -m pipx ensurepath && pipx install semgrep"},{"id":"brew-jq","kind":"brew","formula":"jq","bins":["jq"],"label":"Install jq (brew)"},{"id":"brew-trufflehog","kind":"brew","formula":"trufflehog","bins":["trufflehog"],"label":"Install trufflehog (brew)"},{"id":"brew-semgrep","kind":"brew","formula":"semgrep","bins":["semgrep"],"label":"Install semgrep (brew)"}]}}

security-audit

A hostile-by-design, fail-closed audit workflow for codebases and OpenClaw/ClawHub skills.

It does not try to answer “does this skill work?”. It tries to answer: “can this skill betray the system?”

What it checks (high level)

This skill’s scripts combine multiple layers:

  • Secrets / credential leakage: trufflehog
  • Static analysis: semgrep (auto rules)
  • Hostile repo audit (custom): prompt-injection signals, persistence mechanisms, suspicious artifacts, dependency hygiene

If any layer fails, the overall audit is FAIL.

Run an audit (JSON)

From this skill folder (use bash so it works even if executable bits were not preserved by a zip download):

bash scripts/run_audit_json.sh <path>

Example:

bash scripts/run_audit_json.sh . > /tmp/audit.json
jq '.ok, .tools' /tmp/audit.json

Security levels (user configurable)

Set the strictness level (default: standard):

OPENCLAW_AUDIT_LEVEL=standard bash scripts/run_audit_json.sh <path>
OPENCLAW_AUDIT_LEVEL=strict   bash scripts/run_audit_json.sh <path>
OPENCLAW_AUDIT_LEVEL=paranoid bash scripts/run_audit_json.sh <path>
  • standard: pragmatic strict defaults (lockfiles required; install hooks/persistence/prompt-injection signals fail)
  • strict: more patterns become hard FAIL (e.g. minified/obfuscation artifacts)
  • paranoid: no "best-effort" hashing failures; more fail-closed behavior

Manifest requirement (for zero-trust install workflows)

For strict/quarantine workflows, require a machine-readable intent/permissions manifest at repo root:

  • openclaw-skill.json

If a repo/skill does not provide this manifest, the hostile audit should treat it as FAIL.

See: docs/OPENCLAW_SKILL_MANIFEST_SCHEMA.md.

Optional: execution sandbox (Docker)

Docker is optional here. This skill can be used for static auditing without Docker.

If you want to execute any generated/untrusted code, run it in a separate sandbox workflow (recommended).

Files

  • scripts/run_audit_json.sh — main JSON audit runner
  • scripts/hostile_audit.py — prompt-injection/persistence/dependency hygiene scanner
  • scripts/security_audit.sh — convenience wrapper (always returns JSON, never non-zero)
  • openclaw-skill.json — machine-readable intent/permissions manifest
README.md

security-audit (OpenClaw skill)

This repository is a text-based OpenClaw/ClawHub skill bundle.

  • Entry point: SKILL.md
  • Purpose: hostile, fail-closed auditing of repos/skills before enabling

Quick start

./scripts/run_audit_json.sh <path> > /tmp/audit.json
jq '.ok, .tools' /tmp/audit.json

Security levels

OPENCLAW_AUDIT_LEVEL=standard ./scripts/run_audit_json.sh <path>
OPENCLAW_AUDIT_LEVEL=strict   ./scripts/run_audit_json.sh <path>
OPENCLAW_AUDIT_LEVEL=paranoid ./scripts/run_audit_json.sh <path>

License

MIT (see LICENSE).

Permissions & Security

Security level L1: Low-risk skills with minimal permissions. Review inputs and outputs before running in production.

A hostile-by-design, **fail-closed** audit workflow for codebases and OpenClaw/ClawHub skills. It does **not** try to answer “does this skill work?”. It tries to answer: **“can this skill betray the system?”** ## What it checks (high level) This skill’s scripts combine multiple layers: - **Secrets / credential leakage:** trufflehog - **Static analysis:** semgrep (auto rules) - **Hostile repo audit (custom):** prompt-injection signals, persistence mechanisms, suspicious artifacts, dependency hygiene If any layer fails, the overall audit is **FAIL**. ## Run an audit (JSON) From this skill folder (use `bash` so it works even if executable bits were not preserved by a zip download): ```bash bash scripts/run_audit_json.sh <path> ``` Example: ```bash bash scripts/run_audit_json.sh . > /tmp/audit.json jq '.ok, .tools' /tmp/audit.json ``` ### Security levels (user configurable) Set the strictness level (default: `standard`): ```bash OPENCLAW_AUDIT_LEVEL=standard bash scripts/run_audit_json.sh <path> OPENCLAW_AUDIT_LEVEL=strict bash scripts/run_audit_json.sh <path> OPENCLAW_AUDIT_LEVEL=paranoid bash scripts/run_audit_json.sh <path> ``` - `standard`: pragmatic strict defaults (lockfiles required; install hooks/persistence/prompt-injection signals fail) - `strict`: more patterns become hard FAIL (e.g. minified/obfuscation artifacts) - `paranoid`: no "best-effort" hashing failures; more fail-closed behavior ## Manifest requirement (for zero-trust install workflows) For strict/quarantine workflows, require a machine-readable intent/permissions manifest at repo root: - `openclaw-skill.json` If a repo/skill does not provide this manifest, the hostile audit should treat it as **FAIL**. See: `docs/OPENCLAW_SKILL_MANIFEST_SCHEMA.md`. ## Optional: execution sandbox (Docker) Docker is **optional** here. This skill can be used for static auditing without Docker. If you want to execute any generated/untrusted code, run it in a separate sandbox workflow (recommended). ## Files - `scripts/run_audit_json.sh` — main JSON audit runner - `scripts/hostile_audit.py` — prompt-injection/persistence/dependency hygiene scanner - `scripts/security_audit.sh` — convenience wrapper (always returns JSON, never non-zero) - `openclaw-skill.json` — machine-readable intent/permissions manifest

Requirements

  • OpenClaw CLI installed and configured.
  • Language: Markdown
  • License: MIT
  • Topics:

FAQ

How do I install security-audit?

Run openclaw add @virtaava/sona-security-audit in your terminal. This installs security-audit into your OpenClaw Skills catalog.

Does this skill run locally or in the cloud?

OpenClaw Skills execute locally by default. Review the SKILL.md and permissions before running any skill.

Where can I verify the source code?

The source repository is available at https://github.com/openclaw/skills/tree/main/skills/virtaava/sona-security-audit. Review commits and README documentation before installing.