clawdbot-security
1
总安装量
1
周安装量
#55379
全站排名
安装命令
npx skills add https://github.com/spanishflu-est1918/clawdbot-security --skill clawdbot-security
Agent 安装分布
windsurf
1
clawdbot
1
opencode
1
claude-code
1
gemini-cli
1
Skill 文档
Clawdbot Security
Harden Clawdbot Gateway deployments by fetching current security practices and applying them.
Fetch Current Docs First
Before advising on security, fetch the latest official documentation:
# Primary security guide
web_fetch https://raw.githubusercontent.com/clawdbot/clawdbot/main/docs/gateway/security.md
# Specific topics
web_fetch https://raw.githubusercontent.com/clawdbot/clawdbot/main/docs/gateway/sandboxing.md
web_fetch https://raw.githubusercontent.com/clawdbot/clawdbot/main/docs/gateway/authentication.md
web_fetch https://raw.githubusercontent.com/clawdbot/clawdbot/main/docs/gateway/pairing.md
Quick Commands
clawdbot security audit # Basic check
clawdbot security audit --deep # Live Gateway probe
clawdbot security audit --fix # Auto-apply safe fixes
clawdbot sandbox explain # Debug sandbox/tool policy
Decision Tree
User needs help with security
âââ Running audit or interpreting findings?
â âââ Run `clawdbot security audit`, explain findings, suggest fixes
âââ Configuring access control (DM/group policies)?
â âââ Fetch security.md, explain pairing vs allowlist vs open
âââ Setting up sandboxing?
â âââ Fetch sandboxing.md, explain mode/scope/workspaceAccess
âââ Managing secrets in config?
â âââ Run scripts/extract_secrets.py or guide manual .env creation
âââ Responding to incident?
â âââ Follow contain â rotate â audit workflow
âââ General security question?
âââ Fetch security.md, consult references/quick-reference.md
Three-Layer Model (Quick Summary)
- Sandbox â Where tools run (Docker vs host)
- Tool Policy â Which tools are allowed
- Elevated â Exec-only host escape hatch
For details, read references/quick-reference.md.
Extract Secrets Script
Automate moving hardcoded secrets from config to .env:
python scripts/extract_secrets.py --dry-run # Preview
python scripts/extract_secrets.py # Execute
Audit Priority Order
- Open groups + tools â Lock down with allowlists
- Network exposure â Fix immediately
- Browser control â Require token auth
- File permissions â
chmod 600config,chmod 700dirs - Plugins â Only load trusted ones
- Model choice â Use instruction-hardened models (Opus 4.5)
Incident Response
- Contain: Stop gateway,
bind: "loopback", freeze policies - Rotate: gateway.auth.token, API keys, browser control token
- Audit: Check logs (
/tmp/clawdbot/*.log) and transcripts - Re-run:
clawdbot security audit --deep