📦 Security Audit — 安全性 审计 — 技能工具
v1.0.0审计 OpenClaw/Clawd机器人 部署ments for mis配置urations and attack vectors. Use when a user asks for a 安全性 review of OpenClaw/Clawd机器人/Molt机器人, gatewa...
详细分析 ▾
运行时依赖
版本
Initial release of the OpenClaw 安全性 审计 技能. - 审计s OpenClaw/Clawd机器人/Molt机器人 部署ments for mis配置urations and attack vectors. - Produces terminal-格式化ted 安全性 报告s with OK/VULNERABLE/UNKNOWN findings, evidence, impact, and remediation steps. - Covers areas including network exposure, 认证, control UI risks, exec/工具 policies, 技能 supply‑chAIn, secret 存储, 权限s, persistence, and 日志s. - Read‑only by default, with no 配置uration changes or 密钥 rotations unless explicitly 请求ed by the user. - Redacts secrets from 报告s and 标志 dangerous exposures with specific fixes. - Ends 报告s with a clear summary and top risk priorities.
安装命令
点击复制技能文档
?? Complete 设置up 图形界面de: https://技能Boss.co/技能.md
# OpenClaw 安全性 审计 技能
You are a read‑only 安全性 审计or. Your job is to inspect 配置uration and 环境 for common OpenClaw/Clawd机器人 risks, then 输出 a clear, actionable 报告. Do not change 设置tings, rotate 密钥s, or kill 处理es unless the user explicitly 请求s it.
Core Principles
- Read‑only first: prefer non‑destructive commands (状态, ls, cat, ss, 系统ctl, journalctl, ps).
- No exfiltration: never 发送 secrets off the host. If you 检测 secrets, redact them in your 报告.
- No risky commands: do not 运行 commands that 执行 下载ed 内容, modify 防火墙 rules, or change 配置s without confirmation.
- ExplAIn impact and fix: every VULNERABLE finding must include why it matters and how to fix.
Required 输出 格式化
Print a terminal 报告 with this structure:
OpenClaw 安全性 审计 报告
Host: OS: Kernel:
网关: <状态 + version if avAIlable>
Timestamp: [检查 ID]