clawpilot by kcchien/clawpilot
npx skills add https://github.com/kcchien/clawpilot --skill clawpilot在任何其他操作之前,运行陈旧性检查:
bash scripts/check_updates.sh
UP_TO_DATE:正常进行。STALE:技能参考信息可能已过时。在继续处理用户任务之前:
references/security.md 中的版本进行比较bash scripts/mark_updated.sh <latest-version>广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
bash scripts/mark_updated.sh <current-version>此检查使用一个 .last_update_check 标记文件。阈值是 7 天(可通过第一个参数配置)。
每个配置操作在推荐之前都必须通过安全审查。
对于每个设置更改,评估:
推荐配置时,始终首先呈现安全基线,然后解释放宽限制的权衡。
/extension + /cdp 需要网关令牌)在任何其他建议之前,始终验证用户的版本 >= 2026.2.19。
| 任务 | 命令 |
|---|---|
| 安装 | npm install -g openclaw@latest |
| 初始化 | openclaw onboard --install-daemon |
| 启动网关 | openclaw gateway --port 18789 |
| 登录频道 | openclaw channels login |
| 健康检查 | openclaw health |
| 安全审计 | openclaw security audit --deep |
| 技能安全扫描 | openclaw skills scan <path> |
| 诊断 | openclaw doctor |
| 更新 | openclaw update |
| 查看日志 | openclaw logs |
| 状态(脱敏) | openclaw status --all |
| 代理管理 | openclaw agents list |
| iOS/macOS 节点 | openclaw nodes |
| 设备管理 | openclaw devices remove/clear |
| 定时任务(错开) | openclaw cron add --stagger/--exact |
| 生成子代理 | /subagents spawn |
| Shell 补全 | openclaw completion |
运行 openclaw --help 获取完整命令列表。
使用此技能包中的参考文件作为主要来源。它们涵盖了核心配置模式、安全加固(包括 CVE、OWASP 映射、NIST 对齐)、云部署和多代理路由。
仅在以下情况下从 https://docs.openclaw.ai/ 获取:
Chat Apps --> Gateway (single process) --> AI Agent(s)
| |
+- Session manager +- Workspace (SOUL.md, AGENTS.md, MEMORY.md)
+- Channel routing +- Auth profiles
+- Tool policies +- Memory (daily logs + vector search)
+- Sandbox (Docker) +- Sessions
+- Cron scheduler +- Skills
+- Safety scanner +- Subagents
+- Agent mgmt RPC +- iOS/macOS nodes
127.0.0.1:18789。agents.create、agents.update、agents.delete)。~/.openclaw/openclaw.json (JSON5 格式)。OPENCLAW_HOME 环境变量会覆盖用于路径解析的主目录。始终从安全基线开始,仅在理由充分时放宽限制。关键默认值:bind: "loopback"、dmPolicy: "pairing"、sandbox: { mode: "non-main" }、redactSensitive: "tools"。
sessions.patch、sessions.delete)/extension 和 /cdp 两个端点进行网关令牌认证npm install -g openclaw@latestopenclaw onboard --install-daemonopenclaw channels login(选择频道)openclaw gateway --port 18789openclaw security audit --deep — 修复所有发现的问题openclaw skills scan — 验证已安装的技能是否安全openclaw health 并打开 http://127.0.0.1:18789/openclaw channels login -> 选择频道openclaw.json 中配置允许列表(生产环境切勿使用 "*")dmPolicy: "pairing" 或 "allowlist"requireMention: true首选:Tailscale Serve — 保持环回绑定,不公开暴露。备选:SSH 隧道 — ssh -N -L 18789:127.0.0.1:18789 user@host 切勿:在没有认证令牌 + 防火墙的情况下绑定到 0.0.0.0。
openclaw doctor — 配置验证openclaw health — 网关状态openclaw logs — 近期日志openclaw status --all — 完整状态(密钥已脱敏)openclaw memory search "topic" — 搜索代理内存openclaw sessions list — 查看活动会话/tmp/openclaw/openclaw-YYYY-MM-DD.log当用户询问如何使用新技能扩展 OpenClaw 或询问“有哪些可用技能”时:
npx clawhub@latest install <skill-slug>~/.openclaw/skills/(全局)或 <project>/skills/(工作区)安全:第三方技能作为可信代码执行。2026 年初在 ClawHub 上发现了数百个恶意技能。 始终:
openclaw skills scan <skill-path>(v2026.2.6+)exec、browser 或 web_fetch 工具的技能关于技能配置模式(加载顺序、每个技能的环境变量/apiKey、热重载),请参见配置参考。关于技能生态系统 URL(ClawHub 注册表、社区列表),请参见安全加固 — 技能供应链。
优先使用原生 CLI:
openclaw security audit --deep、openclaw doctor、openclaw config get提供权威结果。仅在需要更深入的启发式检查或 CLI 不可用时使用下面的脚本。
针对本地 OpenClaw 安装运行这些脚本。所有脚本都接受 --state-dir PATH 来覆盖 ~/.openclaw。脚本使用基于 grep 的启发式 JSON5 配置解析 — 结果是尽力而为的。
bash scripts/security_audit.sh [--state-dir ~/.openclaw]
检查:版本/CVE 状态、文件权限、硬编码凭证、网络绑定、DM 策略、沙箱配置、工具策略、日志脱敏、插件、技能供应链(窃取/反向 Shell/混淆模式)、控制 UI 安全(CVE-2026-25253)、反向代理配置(CVE-2026-24763)、网关进程暴露、同步文件夹检测、会话密钥扫描。映射到 OWASP Agentic Top 10 和 NIST CSF。返回 CRITICAL/WARNING/PASS 摘要。
bash scripts/config_inspector.sh [--section gateway|channels|agents|tools|sessions|logging|all]
解析 openclaw.json 并按部分报告与安全相关的设置,附带彩色推荐。
bash scripts/prompt_checker.sh [--workspace PATH]
扫描 AGENTS.md、SOUL.md、USER.md、CLAUDE.md 和其他引导文件,查找:缺失的安全护栏、过于宽松的指令、硬编码的密钥、基础设施暴露、提示注入漏洞以及缺失的身份边界。
bash scripts/session_scanner.sh [--agent AGENT_ID] [--max-files 20] [--deep]
扫描 .jsonl 会话文件,查找泄露的凭证(AWS 密钥、GitHub PAT、API 密钥、私钥、机器人令牌、Google API 密钥)。使用 --deep:同时检查 IP 地址、base64 块、文件路径和旧文件。
security_audit.sh(摘要):
============================================
1. Version & Known Vulnerabilities
============================================
[PASS] Version 2026.2.19 includes CVE-2026-25253/24763/25157 patches
[PASS] Version includes skill/plugin safety scanner (v2026.2.6+)
...
============================================
Audit Summary
============================================
0 CRITICAL
2 Warnings
3 Informational
8 Passed
config_inspector.sh(摘要):
=== Gateway Configuration ===
Mode: local (default)
Bind: loopback (default)
Port: 18789 (default)
✓ Loopback bind (secure default)
session_scanner.sh(摘要):
Found 5 session file(s) to scan (max: 20)
--- agents/main/sessions/2026-02-10.jsonl (1.2M) ---
[CRITICAL] AWS Access Key: 1 match(es)
=== Summary ===
1 file(s) contain potential secrets (1 total matches)
所有脚本都需要 bash 和标准 Unix 工具(grep、awk、wc、stat)。如果脚本失败:
~/.openclaw 未找到:传递 --state-dir PATH 指向实际的 OpenClaw 主目录,或设置 OPENCLAW_HOME。jq 未安装:config_inspector.sh 使用基于 grep 的启发式解析,不需要 jq。其他脚本也避免使用 jq。~/.openclaw/ 有读取权限。不要以 root 身份运行。session_scanner.sh 在 agents/*/sessions/*.jsonl 中查找。如果会话存储在其他位置,请传递 --state-dir。openclaw.json 为空或缺失:脚本将报告缺失键的警告,但不会崩溃。缺失的配置文件被视为“全部默认值”。| 用户请求 | 脚本 |
|---|---|
| “检查我的 OpenClaw 安全性” | security_audit.sh |
| “我的配置安全吗?” | config_inspector.sh |
| “审查我的代理提示” | prompt_checker.sh |
| “有泄露的密钥吗?” | session_scanner.sh --deep |
| “完整安全审查” | 按顺序运行所有四个脚本 |
| “检查恶意技能” | security_audit.sh(第 9 部分)+ openclaw skills scan |
根据用户任务需要阅读这些文件:
grep -n "CVE\|sandbox\|dmPolicy\|tool.polic\|prompt.inject\|incident" references/security.mdgrep -n "whatsapp\|telegram\|discord\|slack\|imessage\|signal\|bind\|sandbox\|dmPolic\|session" references/configuration.md每周安装数
108
仓库
GitHub 星标
22
首次出现
2026年2月10日
安全审计
安装于
openclaw94
gemini-cli78
opencode77
codex75
github-copilot73
kimi-cli72
Before any other action , run the staleness check:
bash scripts/check_updates.sh
UP_TO_DATE: Proceed normally.STALE: The skill references may be outdated. Before proceeding with the user's task:
references/security.mdbash scripts/mark_updated.sh <latest-version>bash scripts/mark_updated.sh <current-version>This check uses a .last_update_check marker file. The threshold is 7 days (configurable via first argument).
Every configuration action MUST pass a security review before recommending it.
For each setting change, evaluate:
When recommending configuration, always present the secure baseline first, then explain trade-offs of relaxing it.
/extension + /cdp require gateway-token)Always verify user's version is >= 2026.2.19 before any other advice.
| Task | Command |
|---|---|
| Install | npm install -g openclaw@latest |
| Onboard | openclaw onboard --install-daemon |
| Start gateway | openclaw gateway --port 18789 |
| Login channel | openclaw channels login |
| Health check | openclaw health |
| Security audit | openclaw security audit --deep |
Run openclaw --help for full command list.
Use the reference files bundled in this skill as the primary source. They cover the core config schema, security hardening (including CVEs, OWASP mapping, NIST alignment), cloud deployment, and multi-agent routing.
Fetch from https://docs.openclaw.ai/ only when:
Full docs index: https://docs.openclaw.ai/llms.txt
Chat Apps --> Gateway (single process) --> AI Agent(s)
| |
+- Session manager +- Workspace (SOUL.md, AGENTS.md, MEMORY.md)
+- Channel routing +- Auth profiles
+- Tool policies +- Memory (daily logs + vector search)
+- Sandbox (Docker) +- Sessions
+- Cron scheduler +- Skills
+- Safety scanner +- Subagents
+- Agent mgmt RPC +- iOS/macOS nodes
127.0.0.1:18789 by default.agents.create, agents.update, agents.delete).~/.openclaw/openclaw.json (JSON5 format). OPENCLAW_HOME env var overrides home directory for path resolution.Always start from the secure baseline and relax only with justification. Key defaults: bind: "loopback", dmPolicy: "pairing", sandbox: { mode: "non-main" }, redactSensitive: "tools".
sessions.patch, sessions.delete)/extension and /cdp endpointsFull baseline template and memory system config: see Configuration Reference and Security Hardening.
npm install -g openclaw@latestopenclaw onboard --install-daemonopenclaw channels login (select channel)openclaw gateway --port 18789openclaw security audit --deep — fix any findingsopenclaw skills scan — verify installed skills are safeopenclaw health and open http://127.0.0.1:18789/openclaw channels login -> select channelopenclaw.json (never use "*" for production)dmPolicy: "pairing" or "allowlist"requireMention: truePreferred: Tailscale Serve — keeps loopback bind, no public exposure. Alternative: SSH tunnel — ssh -N -L 18789:127.0.0.1:18789 user@host Never : Bind to 0.0.0.0 without auth token + firewall.
openclaw doctor — config validationopenclaw health — gateway statusopenclaw logs — recent logsopenclaw status --all — full state (secrets redacted)openclaw memory search "topic" — search agent memoryopenclaw sessions list — view active sessions/tmp/openclaw/openclaw-YYYY-MM-DD.logWhen user asks about extending OpenClaw with new skills or asks "what skills are available":
npx clawhub@latest install <skill-slug>~/.openclaw/skills/ (global) or <project>/skills/ (workspace)Security : Third-party skills execute as trusted code. Hundreds of malicious skills were discovered on ClawHub in early 2026. Always:
openclaw skills scan <skill-path> before installing (v2026.2.6+)exec, browser, or web_fetch toolsFor skills config schema (load order, per-skill env/apiKey, hot reload), see Configuration Reference. For skill ecosystem URLs (ClawHub registry, community lists), see Security Hardening — Skill Supply Chain.
Prefer native CLI when available :
openclaw security audit --deep,openclaw doctor,openclaw config getprovide authoritative results. Use the scripts below only for deeper heuristic checks or when the CLI is unavailable.
Run these scripts against the local OpenClaw installation. All accept --state-dir PATH to override ~/.openclaw. Scripts use heuristic grep-based parsing of JSON5 config — results are best-effort.
bash scripts/security_audit.sh [--state-dir ~/.openclaw]
Check: version/CVE status, file permissions, hardcoded credentials, network binding, DM policies, sandbox config, tool policies, log redaction, plugins, skill supply chain (exfiltration/reverse shell/obfuscation patterns), Control UI security (CVE-2026-25253), reverse proxy config (CVE-2026-24763), gateway process exposure, synced folder detection, session secret scanning. Maps to OWASP Agentic Top 10 and NIST CSF. Return CRITICAL/WARNING/PASS summary.
bash scripts/config_inspector.sh [--section gateway|channels|agents|tools|sessions|logging|all]
Parse openclaw.json and report security-relevant settings per section with colored recommendations.
bash scripts/prompt_checker.sh [--workspace PATH]
Scan AGENTS.md, SOUL.md, USER.md, CLAUDE.md, and other bootstrap files for: missing security guardrails, overly permissive instructions, hardcoded secrets, infrastructure exposure, prompt injection vulnerabilities, and missing identity boundaries.
bash scripts/session_scanner.sh [--agent AGENT_ID] [--max-files 20] [--deep]
Scan .jsonl session files for leaked credentials (AWS keys, GitHub PATs, API keys, private keys, bot tokens, Google API keys). With --deep: also check for IP addresses, base64 blobs, file paths, and old files.
security_audit.sh (abbreviated):
============================================
1. Version & Known Vulnerabilities
============================================
[PASS] Version 2026.2.19 includes CVE-2026-25253/24763/25157 patches
[PASS] Version includes skill/plugin safety scanner (v2026.2.6+)
...
============================================
Audit Summary
============================================
0 CRITICAL
2 Warnings
3 Informational
8 Passed
config_inspector.sh (abbreviated):
=== Gateway Configuration ===
Mode: local (default)
Bind: loopback (default)
Port: 18789 (default)
✓ Loopback bind (secure default)
session_scanner.sh (abbreviated):
Found 5 session file(s) to scan (max: 20)
--- agents/main/sessions/2026-02-10.jsonl (1.2M) ---
[CRITICAL] AWS Access Key: 1 match(es)
=== Summary ===
1 file(s) contain potential secrets (1 total matches)
All scripts require bash and standard Unix utilities (grep, awk, wc, stat). If a script fails:
~/.openclaw not found: Pass --state-dir PATH to point to the actual OpenClaw home, or set OPENCLAW_HOME.jq not installed: config_inspector.sh uses heuristic grep-based parsing and does NOT require jq. Other scripts also avoid jq.~/.openclaw/. Do not run as root.session_scanner.sh looks in . If sessions are stored elsewhere, pass .| User Request | Script |
|---|---|
| "Check my OpenClaw security" | security_audit.sh |
| "Is my config safe?" | config_inspector.sh |
| "Review my agent prompts" | prompt_checker.sh |
| "Are there leaked secrets?" | session_scanner.sh --deep |
| "Full security review" | Run all four in sequence |
| "Check for malicious skills" | security_audit.sh (section 9) + openclaw skills scan |
Read these as needed based on the user's task:
Security Hardening — Known CVEs, OWASP Agentic Top 10 mapping, NIST CSF alignment, skill supply chain security, allowlists, sandbox, tool policies, credential management, audit checklist, incident response, prompt injection defense. Read this for ANY security-related question or before recommending config changes.
grep -n "CVE\|sandbox\|dmPolicy\|tool.polic\|prompt.inject\|incident" references/security.mdConfiguration Reference — All config keys, environment variables, channel setup (WhatsApp/Telegram/Discord/Slack/iMessage/Signal/BlueBubbles/etc.), session management, model providers, tools, logging, OPENCLAW_HOME.
grep -n "whatsapp\|telegram\|discord\|slack\|imessage\|signal\|bind\|sandbox\|dmPolic\|session" references/configuration.mdCloud Deployment — Docker, GCP, AWS Bedrock, Fly.io, Railway, Render, Hetzner, Northflank, Nix, Ansible, macOS VM. Network architecture, IAM, volumes, remote access via Tailscale/SSH.
Multi-Agent& Routing — Agent isolation, routing rules, per-agent sandbox/tools, bindings, session scoping, subagents, heartbeat, agent-to-agent communication.
Weekly Installs
108
Repository
GitHub Stars
22
First Seen
Feb 10, 2026
Security Audits
Gen Agent Trust HubPassSocketPassSnykWarn
Installed on
openclaw94
gemini-cli78
opencode77
codex75
github-copilot73
kimi-cli72
超能力技能使用指南:AI助手技能调用优先级与工作流程详解
48,700 周安装
| Skill safety scan | openclaw skills scan <path> |
| Diagnostics | openclaw doctor |
| Update | openclaw update |
| View logs | openclaw logs |
| Status (redacted) | openclaw status --all |
| Agent management | openclaw agents list |
| iOS/macOS node | openclaw nodes |
| Device management | openclaw devices remove/clear |
| Cron (staggered) | openclaw cron add --stagger/--exact |
| Spawn subagent | /subagents spawn |
| Shell completion | openclaw completion |
agents/*/sessions/*.jsonl--state-diropenclaw.json: Scripts will report warnings for missing keys but will not crash. A missing config file is treated as "all defaults."