SkillAgentSearch skills...

Haveibeenclawned

Security audit for OpenClaw agents — 72 checks, one command

Install / Use

/learn @wadim/Haveibeenclawned
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Have I Been Clawned?

Open source security audit for OpenClaw agents. 72 checks, OWASP-mapped, runs in 60 seconds.

Quick Start

# Download from GitHub, review, run
curl -sSL https://raw.githubusercontent.com/wadim/haveibeenclawned/main/public/audit.sh -o audit.sh
cat audit.sh   # review it
bash audit.sh

Or download from the website (same content):

curl -sSL https://haveibeenclawned.com/audit.sh -o audit.sh

What It Checks

72 security checks across 9 categories:

| Category | What it covers | |----------|---------------| | Identity | Personal email as agent identity, default credentials | | Secrets | Plaintext API keys, secrets in sessions, secrets in git history | | Network | Gateway exposure, authentication, firewall, services on 0.0.0.0 | | Sandbox | Docker privileged mode, seccomp/AppArmor, running as root | | Supply Chain | Malicious skills, MCP vulnerabilities, npm scripts, malware IOC | | Config | File permissions, log redaction, debug mode, cloud sync | | MCP | Tool description poisoning, credential hygiene, definition pinning | | Persistence | Memory poisoning, writable cron/bashrc/launchd paths | | Observability | Telemetry endpoint security, debug endpoint exposure |

Every check is mapped to OWASP ASI, CVE, and CWE references where applicable.

Scoring

| Grade | Score | Meaning | |-------|-------|---------| | A | 90-100 | Hardened | | B | 75-89 | Good | | C | 60-74 | Needs Work | | D | 40-59 | Exposed | | F | 0-39 | Critical |

Skipped checks are excluded from scoring. WARN counts as half credit.

Options

bash audit.sh                          # Full audit, human-readable
bash audit.sh --json                   # JSON output only
bash audit.sh --dry-run                # List checks without running
bash audit.sh --scan-sessions          # Include session transcript scan
bash audit.sh --submit                 # Opt in to anonymous community stats
bash audit.sh --skip=network,secrets   # Skip specific categories
bash audit.sh --categories             # List available categories

Agent Skill

Drop SKILL.md into your agent's skills directory. Then ask your agent:

"Run the open-source security audit from github.com/wadim/haveibeenclawned"

The agent will download the script from GitHub, review it, run the audit, and show you a shareable report link.

Shareable Reports

Results encode into a URL — no backend needed. Share your report:

https://haveibeenclawned.com/report?d=<base64url-encoded-results>

The report page renders your score, grade, and per-check results.

How It Works

Everything runs locally. The script:

  1. Reads OpenClaw config files (never modifies them)
  2. Checks file permissions, container settings, network config
  3. Probes for real vulnerabilities (gateway exposure, metadata service, open ports)
  4. Scores each check as PASS, FAIL, WARN, or SKIP
  5. Calculates a weighted hardening score

No data is sent anywhere unless you explicitly pass --submit.

Contributing

Add checks, update threat intel, improve fix commands. See CONTRIBUTING.md for the full guide.

Quick version:

  1. New checks get the next CLAW number (CLAW-73, CLAW-74, ...) — never renumber existing checks
  2. Update audit.sh (check function + parallel arrays), components/agent-instructions.tsx (CheckCard), and all count references
  3. Every check needs: verified detection, concrete fix command, OWASP/CVE reference, real-world impact

Credits

IOC data (C2 IPs, malicious domains, publishers, AMOS stealer patterns, file hashes) sourced from openclaw-security-monitor by Adi Birzu (MIT license).

License

MIT

View on GitHub
GitHub Stars4
CategoryDevelopment
Updated5d ago
Forks0

Languages

Shell

Security Score

90/100

Audited on Apr 4, 2026

No findings