📦 Sentinel — Agent Security Layer — 安全防护工具

v1.0.5

安全性 layer 用于 OpenClaw agents. Intercepts 和 scans all external input (emails, API接口 responses, web 内容, chat messages, calendar events) 用于...

0· 290·1 当前·1 累计
oleglegegg 头像by @oleglegegg (Oleg)
0
安全扫描
VirusTotal
无害
查看报告
OpenClaw
安全
high confidence
The skill's files, instructions, and requested resources are consistent with a local runtime input/output security filter — it operates as a set of bash filters that read stdin, write logs under ~/.sentinel, and can inject/check canary tokens; nothing in the package requests unrelated credentials, network access, or hidden installers.
评估建议
This skill is a set of local bash filters that scan stdin and stdout for injections and secrets and stores logs under ~/.sentinel. Before installing/using: (1) review and test the scripts on non-sensitive sample data; (2) be aware the canary tool can modify files you point it at (e.g., SOUL.md or other prompts) — back up those files first; (3) the premium rules require jq and an optional premium_patterns.json file (if absent the premium check is a no-op); (4) expect false positives (hex strings ...
详细分析 ▾
用途与能力
The name/description (runtime input/output sentinel) matches the provided artifacts: multiple bash scripts that scan stdin, log threats to ~/.sentinel/threats.jsonl, generate/check canaries, and optionally use a premium patterns file. No unexplained environment variables, binaries, or cloud credentials are required.
指令范围
SKILL.md and scripts stay within the stated purpose (intercept/scan inputs and monitor outputs). Noteworthy: the guide explicitly instructs adding invisible canary markers into SOUL.md or system prompts and recommends piping all external content through the filters — these are expected for a runtime sentinel but do instruct modifying local agent files (SOUL.md/system prompt), so users should review and back up any files before injecting markers.
安装机制
No install spec; this is instruction-plus-scripts (pure bash). No downloads or remote installers are invoked by the package. The scripts rely on common utilities (grep, sed, base64, optionally jq).
凭证需求
The skill asks for no credentials or env vars. The scripts scan for many secret/token formats (OpenAI, AWS, GitHub, crypto keys, etc.), which is coherent with its stated goal. The premium pack path (~/.sentinel/premium_patterns.json) and optional use of jq are documented and proportional.
持久化与权限
The scripts create and write logs under ~/.sentinel and can inject canary markers into user-specified files. always:false and autonomous invocation defaults are unchanged. Writing to user files and creating ~/.sentinel is expected for the tool's purpose but is a permanent local change the user should consent to.
安全有层次,运行前请审查代码。

运行时依赖

无特殊依赖

安装命令

点击复制
官方npx clawhub@latest install sentinel-oleg
镜像加速npx clawhub@latest install sentinel-oleg --registry https://cn.longxiaskill.com
数据来源ClawHub ↗ · 中文优化:龙虾技能库