Haveibeenclawned
Security audit for OpenClaw agents — 72 checks, one command
Install / Use
/learn @wadim/HaveibeenclawnedREADME
Have I Been Clawned?
Open source security audit for OpenClaw agents. 72 checks, OWASP-mapped, runs in 60 seconds.
Quick Start
# Download from GitHub, review, run
curl -sSL https://raw.githubusercontent.com/wadim/haveibeenclawned/main/public/audit.sh -o audit.sh
cat audit.sh # review it
bash audit.sh
Or download from the website (same content):
curl -sSL https://haveibeenclawned.com/audit.sh -o audit.sh
What It Checks
72 security checks across 9 categories:
| Category | What it covers | |----------|---------------| | Identity | Personal email as agent identity, default credentials | | Secrets | Plaintext API keys, secrets in sessions, secrets in git history | | Network | Gateway exposure, authentication, firewall, services on 0.0.0.0 | | Sandbox | Docker privileged mode, seccomp/AppArmor, running as root | | Supply Chain | Malicious skills, MCP vulnerabilities, npm scripts, malware IOC | | Config | File permissions, log redaction, debug mode, cloud sync | | MCP | Tool description poisoning, credential hygiene, definition pinning | | Persistence | Memory poisoning, writable cron/bashrc/launchd paths | | Observability | Telemetry endpoint security, debug endpoint exposure |
Every check is mapped to OWASP ASI, CVE, and CWE references where applicable.
Scoring
| Grade | Score | Meaning | |-------|-------|---------| | A | 90-100 | Hardened | | B | 75-89 | Good | | C | 60-74 | Needs Work | | D | 40-59 | Exposed | | F | 0-39 | Critical |
Skipped checks are excluded from scoring. WARN counts as half credit.
Options
bash audit.sh # Full audit, human-readable
bash audit.sh --json # JSON output only
bash audit.sh --dry-run # List checks without running
bash audit.sh --scan-sessions # Include session transcript scan
bash audit.sh --submit # Opt in to anonymous community stats
bash audit.sh --skip=network,secrets # Skip specific categories
bash audit.sh --categories # List available categories
Agent Skill
Drop SKILL.md into your agent's skills directory. Then ask your agent:
"Run the open-source security audit from github.com/wadim/haveibeenclawned"
The agent will download the script from GitHub, review it, run the audit, and show you a shareable report link.
Shareable Reports
Results encode into a URL — no backend needed. Share your report:
https://haveibeenclawned.com/report?d=<base64url-encoded-results>
The report page renders your score, grade, and per-check results.
How It Works
Everything runs locally. The script:
- Reads OpenClaw config files (never modifies them)
- Checks file permissions, container settings, network config
- Probes for real vulnerabilities (gateway exposure, metadata service, open ports)
- Scores each check as PASS, FAIL, WARN, or SKIP
- Calculates a weighted hardening score
No data is sent anywhere unless you explicitly pass --submit.
Contributing
Add checks, update threat intel, improve fix commands. See CONTRIBUTING.md for the full guide.
Quick version:
- New checks get the next CLAW number (CLAW-73, CLAW-74, ...) — never renumber existing checks
- Update
audit.sh(check function + parallel arrays),components/agent-instructions.tsx(CheckCard), and all count references - Every check needs: verified detection, concrete fix command, OWASP/CVE reference, real-world impact
Credits
IOC data (C2 IPs, malicious domains, publishers, AMOS stealer patterns, file hashes) sourced from openclaw-security-monitor by Adi Birzu (MIT license).
License
MIT
