ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      adversa-ai

      Safety Report

      SecureClaw

      @adversa-ai

      Security skill for OpenClaw agents (7-framework aligned). 15 core rules + automated scripts covering OWASP ASI Top 10, MITRE ATLAS, CoSAI, CSA MAESTRO, and N...

      693Downloads
      1Installs
      3Stars
      1Versions
      Workflow Automation3,323CLI & Shell Tools1,805Browser Automation1,737Security & Compliance1,716

      Security Analysis

      high confidence
      Suspicious0.12 risk

      The skill is broadly coherent with a security/audit purpose but is intrusive (it modifies cognitive/config files that persist after uninstall), makes local changes automatically (hardening, baselines, SOUL.md edits), and includes remote advisory fetching — review and vet before running.

      Feb 20, 202617 files4 concerns
      Purpose & Capabilityok

      Name/description (security audit, privacy checks, supply-chain scanning, incident response) matches the included scripts and configs. The scripts perform the audits/hardening the SKILL.md promises and do not request unrelated cloud credentials or unrelated binaries.

      Instruction Scopenote

      SKILL.md directs the agent to run the included scripts (audit, harden, scan, emergency). The scripts do more than passive checks: quick-harden.sh will modify configs (sed on openclaw.json), create/append privacy & injection directives in SOUL.md, create baseline files, and install entries into TOOLS.md/AGENTS.md. These actions are consistent with a hardening tool but are intrusive and could change agent behavior without explicit per-change approvals unless the user inspects them first.

      Install Mechanismnote

      No remote install spec (no arbitrary download/extract) — installer is a local shell copy operation (install.sh copies files into ~/.openclaw). check-advisories.sh fetches a default feed from https://adversa-ai.github.io (configurable via SECURECLAW_FEED_URL). No evidence of automatic remote code execution or use of URL shorteners, but the skill will make local filesystem changes when install.sh or quick-harden.sh are run.

      Credentialsnote

      The package declares no required env vars or primary credential. Scripts do read local sensitive files (openclaw.json, .env, SOUL.md, other workspace files) to perform checks and may log findings. That reading is proportional to an audit tool, but it means the scripts will access credential-bearing files (they do not require you to supply secrets explicitly).

      Persistence & Privilegeconcern

      Installer and hardening scripts append to TOOLS.md/AGENTS.md and SOUL.md and create baselines under ~/.openclaw/.secureclaw. uninstall.sh explicitly warns it will NOT remove SecureClaw directives added to SOUL.md. That means modifications to cognitive/state files persist after uninstall and can influence agent behavior long-term. The skill is not marked always:true, but it writes persistent artifacts and registers itself in workspace files — this persistent presence is significant and warrants caution.

      Guidance

      What to consider before installing SecureClaw: - Functionality: The skill appears to do what it claims (audits, hardens, scans skills, privacy checks, emergency response). The bundled scripts implement those features locally — there are no required external credentials. - Intrusiveness: Installing/running the included scripts will modify your OpenClaw installation: it copies files into ~/.openclaw/skills, appends entries to TOOLS.md and AGENTS.md, creates baselines under ~/.openclaw/.secureclaw, and quick-harden.sh will modify openclaw.json and append privacy/injection directives to SOUL.md. Uninstall does not automatically remove the SOUL.md edits. Treat these as persistent configuration changes. - Network activity: check-advisories.sh fetches a remote advisory feed by default. If you are restrictive about network calls, either set SECURECLAW_FEED_URL to a vetted source or avoid running that script. - Before you run anything: read the install.sh, quick-harden.sh, and uninstall.sh to understand exact changes. Back up SOLID copies of openclaw.json, SOUL.md, and any cognitive files. Consider running the scripts in a test environment first. - If you want reduced risk: run the audit/scan scripts (quick-audit.sh, scan-skills.sh, check-privacy.sh) first in 'read-only' mode to see findings, do NOT run quick-harden.sh until you review each proposed change, and do not run install.sh unless you accept the persistent modifications. - The scanner flagged an 'ignore previous instructions' pattern; this is likely because the skill ships injection-detection regexes. Still, verify the phrase is only used for detection (not as an executable instruction).

      Latest Release

      v2.2.0

      Security skill for OpenClaw agents by Adversa AI. 15 rules + 9 automated scripts covering 7 frameworks: OWASP ASI Top 10, MITRE ATLAS, CoSAI, CSA Singapore, CSA MAESTRO, and NIST AI 100-2 E2025.

      Popular Skills

      self-improving-agent

      @pskoett · 1,456 stars

      Gog

      @steipete · 672 stars

      Tavily Web Search

      @arun-8687 · 620 stars

      Find Skills

      @JimLiuxinghai · 529 stars

      Proactive Agent

      @halthelobster · 426 stars

      Summarize

      @summarize · 415 stars

      Published by @adversa-ai on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]