clawpilot
npx skills add https://github.com/kcchien/clawpilot --skill clawpilot
Agent 安装分布
Skill 文档
OpenClaw Expert Skill
Security-First Principle
Every configuration action MUST pass a security review before recommending it.
For each setting change, evaluate:
- Blast radius â If this setting is exploited, what can an attacker reach?
- Credential exposure â Are secrets stored safely? Permissions correct?
- Network surface â Is the gateway exposed beyond what’s necessary?
- Prompt injection risk â Can untrusted message content manipulate the agent?
- Supply chain risk â Are installed skills/plugins from trusted sources?
When recommending configuration, always present the secure baseline first, then explain trade-offs of relaxing it.
Critical CVEs (Must Check)
- CVE-2026-25253 (CVSS 8.8): Token exfiltration via Control UI â fixed in 2026.1.29
- CVE-2026-24763: Command injection â fixed in 2026.1.29
- CVE-2026-25157: Command injection (chainable with 25253) â fixed in 2026.1.29
Always verify user’s version is >= 2026.1.29 before any other advice.
Quick Reference
| Task | Command |
|---|---|
| Install | npm install -g openclaw@latest |
| Onboard | openclaw onboard --install-daemon |
| Start gateway | openclaw gateway --port 18789 |
| Login channel | openclaw channels login |
| Health check | openclaw health |
| Security audit | openclaw security audit --deep |
| Skill safety scan | openclaw skills scan <path> |
| Diagnostics | openclaw doctor |
| Update | openclaw update |
| View logs | openclaw logs |
| Status (redacted) | openclaw status --all |
| Agent management | openclaw agents list |
| iOS/macOS node | openclaw nodes |
Run openclaw --help for full command list.
Documentation Source
Use the reference files bundled in this skill as the primary source. They cover the core config schema, security hardening (including CVEs, OWASP mapping, NIST alignment), cloud deployment, and multi-agent routing.
Fetch from https://docs.openclaw.ai/ only when:
- The bundled references do not cover a feature the user asks about
- Version-specific behavior requires the latest docs
- A command or config key is absent from the bundled references
Full docs index: https://docs.openclaw.ai/llms.txt
Core Architecture
Chat Apps --> Gateway (single process) --> AI Agent(s)
| |
+- Session manager +- Workspace (SOUL.md, AGENTS.md, MEMORY.md)
+- Channel routing +- Auth profiles
+- Tool policies +- Memory (daily logs + vector search)
+- Sandbox (Docker) +- Sessions
+- Cron scheduler +- Skills
+- Safety scanner +- Subagents
+- Agent mgmt RPC +- iOS/macOS nodes
- Gateway: Single source of truth for sessions, routing, channel connections. Binds to
127.0.0.1:18789by default. - Agents: Isolated entities with own workspace, state dir, auth profiles, session store. Manageable via RPC (
agents.create,agents.update,agents.delete). - Channels: Plugin-based â WhatsApp, Telegram, Discord, Slack, iMessage, Signal, LINE, Matrix, Teams, Google Chat, Mattermost, BlueBubbles, Feishu, Zalo.
- Config:
~/.openclaw/openclaw.json(JSON5 format).OPENCLAW_HOMEenv var overrides home directory for path resolution. - Nodes: iOS alpha + macOS nodes for remote code execution via pairing.
Secure Baseline
Always start from the secure baseline and relax only with justification. Key defaults: bind: "loopback", dmPolicy: "pairing", sandbox: { mode: "non-main" }, redactSensitive: "tools".
Full baseline template and memory system config: see Configuration Reference and Security Hardening.
Common Workflows
Initial Setup
npm install -g openclaw@latestopenclaw onboard --install-daemonopenclaw channels login(select channel)openclaw gateway --port 18789- Run
openclaw security audit --deepâ fix any findings - Run
openclaw skills scanâ verify installed skills are safe - Verify:
openclaw healthand openhttp://127.0.0.1:18789/
Add a Channel
openclaw channels login-> select channel- Configure allowlists in
openclaw.json(never use"*"for production) - Set
dmPolicy: "pairing"or"allowlist" - For groups:
requireMention: true - Security review: Verify allowlist, check tool access for that channel
Remote Access (Secure)
Preferred: Tailscale Serve â keeps loopback bind, no public exposure.
Alternative: SSH tunnel â ssh -N -L 18789:127.0.0.1:18789 user@host
Never: Bind to 0.0.0.0 without auth token + firewall.
Troubleshooting
openclaw doctorâ config validationopenclaw healthâ gateway statusopenclaw logsâ recent logsopenclaw status --allâ full state (secrets redacted)openclaw memory search "topic"â search agent memoryopenclaw sessions listâ view active sessions- Check
/tmp/openclaw/openclaw-YYYY-MM-DD.log
Discover & Install Skills
When user asks about extending OpenClaw with new skills or asks “what skills are available”:
- Official registry: https://clawhub.com
- Community curated list (1,715+ skills, 31 categories): https://github.com/VoltAgent/awesome-openclaw-skills
- Install via CLI:
npx clawhub@latest install <skill-slug> - Manual install: copy skill folder to
~/.openclaw/skills/(global) or<project>/skills/(workspace)
Security: Third-party skills execute as trusted code. Hundreds of malicious skills were discovered on ClawHub in early 2026. Always:
- Run
openclaw skills scan <skill-path>before installing (v2026.2.6+) - Review source code, especially skills using
exec,browser, orweb_fetchtools - Pin versions and avoid auto-updating untrusted skills
For skills config schema (load order, per-skill env/apiKey, hot reload), see Configuration Reference. For skill ecosystem URLs (ClawHub registry, community lists), see Security Hardening â Skill Supply Chain.
Local Inspection Scripts
Prefer native CLI when available:
openclaw security audit --deep,openclaw doctor,openclaw config getprovide authoritative results. Use the scripts below only for deeper heuristic checks or when the CLI is unavailable.
Run these scripts against the local OpenClaw installation. All accept --state-dir PATH to override ~/.openclaw. Scripts use heuristic grep-based parsing of JSON5 config â results are best-effort.
Full Security Audit
bash scripts/security_audit.sh [--state-dir ~/.openclaw]
Check: version/CVE status, file permissions, hardcoded credentials, network binding, DM policies, sandbox config, tool policies, log redaction, plugins, skill supply chain (exfiltration/reverse shell/obfuscation patterns), Control UI security (CVE-2026-25253), reverse proxy config (CVE-2026-24763), gateway process exposure, synced folder detection, session secret scanning. Maps to OWASP Agentic Top 10 and NIST CSF. Return CRITICAL/WARNING/PASS summary.
Configuration Inspector
bash scripts/config_inspector.sh [--section gateway|channels|agents|tools|sessions|logging|all]
Parse openclaw.json and report security-relevant settings per section with colored recommendations.
Prompt & System Instruction Checker
bash scripts/prompt_checker.sh [--workspace PATH]
Scan AGENTS.md, SOUL.md, USER.md, CLAUDE.md, and other bootstrap files for: missing security guardrails, overly permissive instructions, hardcoded secrets, infrastructure exposure, prompt injection vulnerabilities, and missing identity boundaries.
Session Transcript Scanner
bash scripts/session_scanner.sh [--agent AGENT_ID] [--max-files 20] [--deep]
Scan .jsonl session files for leaked credentials (AWS keys, GitHub PATs, API keys, private keys, bot tokens, Google API keys). With --deep: also check for IP addresses, base64 blobs, file paths, and old files.
Example Output
security_audit.sh (abbreviated):
============================================
1. Version & Known Vulnerabilities
============================================
[PASS] Version 2026.2.9 includes CVE-2026-25253/24763/25157 patches
[PASS] Version includes skill/plugin safety scanner (v2026.2.6+)
...
============================================
Audit Summary
============================================
0 CRITICAL
2 Warnings
3 Informational
8 Passed
config_inspector.sh (abbreviated):
=== Gateway Configuration ===
Mode: local (default)
Bind: loopback (default)
Port: 18789 (default)
â Loopback bind (secure default)
session_scanner.sh (abbreviated):
Found 5 session file(s) to scan (max: 20)
--- agents/main/sessions/2026-02-10.jsonl (1.2M) ---
[CRITICAL] AWS Access Key: 1 match(es)
=== Summary ===
1 file(s) contain potential secrets (1 total matches)
Script Prerequisites & Error Handling
All scripts require bash and standard Unix utilities (grep, awk, wc, stat). If a script fails:
~/.openclawnot found: Pass--state-dir PATHto point to the actual OpenClaw home, or setOPENCLAW_HOME.jqnot installed:config_inspector.shuses heuristic grep-based parsing and does NOT requirejq. Other scripts also avoidjq.- Permission denied: Scripts only read files â ensure the current user has read access to
~/.openclaw/. Do not run as root. - No session files found:
session_scanner.shlooks inagents/*/sessions/*.jsonl. If sessions are stored elsewhere, pass--state-dir. - Empty or missing
openclaw.json: Scripts will report warnings for missing keys but will not crash. A missing config file is treated as “all defaults.”
When to Run Scripts
| User Request | Script |
|---|---|
| “Check my OpenClaw security” | security_audit.sh |
| “Is my config safe?” | config_inspector.sh |
| “Review my agent prompts” | prompt_checker.sh |
| “Are there leaked secrets?” | session_scanner.sh --deep |
| “Full security review” | Run all four in sequence |
| “Check for malicious skills” | security_audit.sh (section 9) + openclaw skills scan |
Reference Files
Read these as needed based on the user’s task:
-
Security Hardening â Known CVEs, OWASP Agentic Top 10 mapping, NIST CSF alignment, skill supply chain security, allowlists, sandbox, tool policies, credential management, audit checklist, incident response, prompt injection defense. Read this for ANY security-related question or before recommending config changes.
- Quick lookup:
grep -n "CVE\|sandbox\|dmPolicy\|tool.polic\|prompt.inject\|incident" references/security.md
- Quick lookup:
-
Configuration Reference â All config keys, environment variables, channel setup (WhatsApp/Telegram/Discord/Slack/iMessage/Signal/BlueBubbles/etc.), session management, model providers, tools, logging, OPENCLAW_HOME.
- Quick lookup:
grep -n "whatsapp\|telegram\|discord\|slack\|imessage\|signal\|bind\|sandbox\|dmPolic\|session" references/configuration.md
- Quick lookup:
-
Cloud Deployment â Docker, GCP, AWS Bedrock, Fly.io, Railway, Render, Hetzner, Northflank, Nix, Ansible, macOS VM. Network architecture, IAM, volumes, remote access via Tailscale/SSH.
-
Multi-Agent & Routing â Agent isolation, routing rules, per-agent sandbox/tools, bindings, session scoping, subagents, heartbeat, agent-to-agent communication.