runtime-sentinel
Runtime security guardian for OpenClaw agents. Use this skill whenever the user mentions security, skill safety, prompt injection, malware, suspicious behavior, credential leaks, network monitoring, skill integrity, or the ClawHavoc attack. Also trigger for phrases like "is this skill safe", "audit my skills", "check for threats", "my agent is acting weird", "scan for malware", "protect my agent", or any concern about what installed skills are doing at runtime. runtime-sentinel provides five active defenses: skill integrity hashing, prompt injection detection, credential exposure auditing, network egress monitoring, and process anomaly detection. Free tier covers hashing and basic injection scanning. Premium features (continuous daemon, egress monitoring, process anomaly detection) are gated via x402 USDC micropayments on Base — no account or API key required.
Best use case
runtime-sentinel is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Runtime security guardian for OpenClaw agents. Use this skill whenever the user mentions security, skill safety, prompt injection, malware, suspicious behavior, credential leaks, network monitoring, skill integrity, or the ClawHavoc attack. Also trigger for phrases like "is this skill safe", "audit my skills", "check for threats", "my agent is acting weird", "scan for malware", "protect my agent", or any concern about what installed skills are doing at runtime. runtime-sentinel provides five active defenses: skill integrity hashing, prompt injection detection, credential exposure auditing, network egress monitoring, and process anomaly detection. Free tier covers hashing and basic injection scanning. Premium features (continuous daemon, egress monitoring, process anomaly detection) are gated via x402 USDC micropayments on Base — no account or API key required.
Teams using runtime-sentinel should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/runtime-sentinel/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How runtime-sentinel Compares
| Feature / Agent | runtime-sentinel | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Runtime security guardian for OpenClaw agents. Use this skill whenever the user mentions security, skill safety, prompt injection, malware, suspicious behavior, credential leaks, network monitoring, skill integrity, or the ClawHavoc attack. Also trigger for phrases like "is this skill safe", "audit my skills", "check for threats", "my agent is acting weird", "scan for malware", "protect my agent", or any concern about what installed skills are doing at runtime. runtime-sentinel provides five active defenses: skill integrity hashing, prompt injection detection, credential exposure auditing, network egress monitoring, and process anomaly detection. Free tier covers hashing and basic injection scanning. Premium features (continuous daemon, egress monitoring, process anomaly detection) are gated via x402 USDC micropayments on Base — no account or API key required.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
SKILL.md Source
# runtime-sentinel A runtime security skill for OpenClaw. Defends against the threat landscape exposed by ClawHavoc: backdoored skills, prompt injection via external data, credential exfiltration, and process-level abuse. **Free tier**: skill integrity checks, basic injection scanning. **Premium** (x402/USDC/Base): continuous daemon monitoring, network egress monitoring, process anomaly detection, full audit log. --- ## Quick start ``` # One-shot audit of all installed skills (free) sentinel audit # Continuous guardian daemon (premium — will prompt for x402 payment) sentinel daemon start # Scan a single skill before installing sentinel check <skill-path-or-clawhub-id> ``` --- ## What runtime-sentinel defends against See `references/threat-model.md` for the full threat matrix. In brief: | Threat | Feature | Tier | |---|---|---| | Tampered skill files post-install | Integrity hashing | Free | | Prompt injection via email/web/skill output | Injection scanner | Free | | Plaintext secrets in skill dirs / SOUL.md | Credential auditor | Free | | Unexpected outbound connections | Egress monitor | Premium | | Shell commands outside declared behavior | Process anomaly | Premium | | Continuous real-time protection | Daemon mode | Premium | --- ## Workflow ### 1 — First-time setup ```bash # Install the binary (built from scripts/src/) cargo install --path scripts/ --bin sentinel # Verify installation and print wallet address sentinel setup ``` `sentinel setup` will: - Generate or import a Base wallet (BIP-39, stored in `~/.sentinel/wallet`) - Print the wallet address so the user can fund it with USDC for premium - Run a free baseline audit and print results ### 2 — On-demand audit (free) When the user says anything like "scan my skills", "audit", "check for threats": ```bash sentinel audit [--path ~/.openclaw/skills] ``` Output: a structured report of hash mismatches, injection patterns, and exposed credentials. No payment required. ### 3 — Single skill check before install (free) When the user wants to vet a skill before running `clawhub install`: ```bash sentinel check <skill-directory-or-clawhub-id> ``` Prints a risk score (LOW / MEDIUM / HIGH / CRITICAL) with findings. ### 4 — Premium features via x402 When the user asks for daemon mode, egress monitoring, or process anomaly detection, `sentinel` will automatically: 1. Hit the sentinel API endpoint 2. Receive a `402 Payment Required` with price in the `X-Payment-Request` header (typically $0.01–$0.05/day for daemon mode) 3. Sign the USDC transfer from `~/.sentinel/wallet` 4. Retry the request — access granted for the paid period The user will see the price *before* their wallet signs anything. All non-custodial. See `references/x402-payment.md` for the full payment flow. ### 5 — Daemon mode (premium) ```bash sentinel daemon start # runs in foreground, writes to ~/.sentinel/daemon.log # Run in background from your shell if needed: # sentinel daemon start > ~/.sentinel/daemon.log 2>&1 & # disown sentinel daemon status sentinel daemon stop sentinel daemon logs # tail the audit log ``` The daemon watches: - `~/.openclaw/skills/**` for file mutations (inotify / FSEvents) - `~/.openclaw/SOUL.md` and `MEMORY.md` for unauthorized writes - Network connections made by skill subprocesses - Child process trees for undeclared shell commands Alerts are delivered via OpenClaw's notification system and written to the audit log. --- ## Interpreting results ### Risk levels - **LOW**: No findings, or informational only (e.g. skill requests network but declares it) - **MEDIUM**: Undeclared permission, suspicious pattern, or stale hash - **HIGH**: Known malicious pattern, credential exposure, or undeclared egress - **CRITICAL**: Active exfiltration attempt, reverse shell indicator, or SOUL.md mutation ### What to do on HIGH / CRITICAL 1. `sentinel isolate <skill-name>` — quarantines the skill (moves it out of the active skills directory) 2. Review the finding in `~/.sentinel/audit.log` 3. Check the skill's ClawHub VirusTotal report 4. If confirmed malicious, `clawhub uninstall <skill>` and report via `sentinel report <skill-name>` --- ## Reference files Read these when you need deeper detail: - `references/threat-model.md` — Full threat matrix and attack descriptions from ClawHavoc and similar campaigns - `references/x402-payment.md` — x402 payment flow, wallet setup, and troubleshooting - `references/binary-build.md` — How to build `sentinel` from source, cross- compilation targets, CI/CD --- ## Wallet setup for premium features ```bash sentinel wallet show # print address and USDC balance sentinel wallet fund # print QR code and address to send USDC sentinel wallet export # export mnemonic for backup (handle carefully) sentinel wallet recover # restore from mnemonic on a new machine ``` Minimum recommended balance for uninterrupted daemon mode: **$1 USDC** (roughly 20–100 days of coverage depending on scan frequency). --- ## Privacy `sentinel` is fully local. No skill content, file paths, or scan results are sent to any server. The only outbound calls are: 1. x402 payment verification to the Base facilitator (amount + wallet address only) 2. Optional: VirusTotal hash lookups (hash only, no file content) Both can be disabled with `--offline` for air-gapped environments (free tier only in offline mode).
Related Skills
claw-sentinel
Runtime security layer for OpenClaw agents. Intercepts and scans all external input (emails, API responses, web content, chat messages, calendar events) for prompt injection, data exfiltration, credential leaks, and social engineering BEFORE the agent processes it. Also monitors agent output for secret leakage and suspicious command requests. Use when: your agent processes untrusted external data, you need automatic input sanitization, output monitoring to prevent data leaks, or multi-language injection detection (EN/RU/ZH/ES/AR).
youtube-watcher
Fetch and read transcripts from YouTube videos. Use when you need to summarize a video, answer questions about its content, or extract information from it.
youtube-transcript
Fetch and summarize YouTube video transcripts. Use when asked to summarize, transcribe, or extract content from YouTube videos. Handles transcript fetching via residential IP proxy to bypass YouTube's cloud IP blocks.
youtube-auto-captions - YouTube 自动字幕
## 描述
youtube
YouTube Data API integration with managed OAuth. Search videos, manage playlists, access channel data, and interact with comments. Use this skill when users want to interact with YouTube. For other third party apps, use the api-gateway skill (https://clawhub.ai/byungkyu/api-gateway).
yahoo-finance
Get stock prices, quotes, fundamentals, earnings, options, dividends, and analyst ratings using Yahoo Finance. Uses yfinance library - no API key required.
xurl
A Twitter research and content intelligence skill focused on attracting WordPress and Shopify clients. Use to analyze Twitter profiles, threads, and conversations for: (1) Identifying what small agency founders and eCommerce brands are discussing; (2) Understanding pain points around WordPress performance, Shopify CRO, and development bottlenecks; (3) Extracting high-performing content angles; (4) Turning insights into authority-building posts; (5) Converting Twitter intelligence into business leverage for clear content angles, strong positioning, and qualified inbound leads.
xlsx
Use this skill any time a spreadsheet file is the primary input or output. This means any task where the user wants to: open, read, edit, or fix an existing .xlsx, .xlsm, .csv, or .tsv file (e.g., adding columns, computing formulas, formatting, charting, cleaning messy data); create a new spreadsheet from scratch or from other data sources; or convert between tabular file formats. Trigger especially when the user references a spreadsheet file by name or path — even casually (like "the xlsx in my downloads") — and wants something done to it or produced from it. Also trigger for cleaning or restructuring messy tabular data files (malformed rows, misplaced headers, junk data) into proper spreadsheets. The deliverable must be a spreadsheet file. Do NOT trigger when the primary deliverable is a Word document, HTML report, standalone Python script, database pipeline, or Google Sheets API integration, even if tabular data is involved.
xiaohongshu-mcp
Automate Xiaohongshu (RedNote) content operations using a Python client for the xiaohongshu-mcp server. Use for: (1) Publishing image, text, and video content, (2) Searching for notes and trends, (3) Analyzing post details and comments, (4) Managing user profiles and content feeds. Triggers: xiaohongshu automation, rednote content, publish to xiaohongshu, xiaohongshu search, social media management.
twitter-openclaw
Interact with Twitter/X — read tweets, search, post, like, retweet, and manage your timeline.
x-twitter-growth
X/Twitter growth engine for building audience, crafting viral content, and analyzing engagement. Use when the user wants to grow on X/Twitter, write tweets or threads, analyze their X profile, research competitors on X, plan a posting strategy, or optimize engagement. Complements social-content (generic multi-platform) with X-specific depth: algorithm mechanics, thread engineering, reply strategy, profile optimization, and competitive intelligence via web search.
akshare-online-alpha
Run Wyckoff master-style analysis from stock codes, holdings (symbol/cost/qty), cash, CSV data, and optional chart images. Use when users want online multi-source data fetching with source switching, strict Beijing-time trading-session checks, fixed system prompt analysis, single-stock analysis, holding rotation, holding add/reduce suggestions, or empty-position cash deployment suggestions.