opena2a-security
Security hardening for OpenClaw. Audit your configuration, scan installed skills for malware, detect CVE-2026-25253, check credential exposure, and get actionable fix recommendations. Runs locally with no external API calls.
Best use case
opena2a-security is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Security hardening for OpenClaw. Audit your configuration, scan installed skills for malware, detect CVE-2026-25253, check credential exposure, and get actionable fix recommendations. Runs locally with no external API calls.
Teams using opena2a-security should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/opena2a-security/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How opena2a-security Compares
| Feature / Agent | opena2a-security | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Security hardening for OpenClaw. Audit your configuration, scan installed skills for malware, detect CVE-2026-25253, check credential exposure, and get actionable fix recommendations. Runs locally with no external API calls.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Marketing
Discover AI agents for marketing workflows, from SEO and content production to campaign research, outreach, and analytics.
AI Agents for Startups
Explore AI agent skills for startup validation, product research, growth experiments, documentation, and fast execution with small teams.
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
SKILL.md Source
# OpenA2A Security for OpenClaw Security auditing and hardening for OpenClaw installations. Scan your configuration, detect known vulnerabilities, audit installed skills for malicious code, and get specific remediation steps. This skill runs entirely locally. No data leaves your machine. No API keys required. ## What You Can Ask ### Quick Security Check Ask for a fast overview of your security posture: ``` "Run a security audit on my OpenClaw setup" ``` ``` "Is my OpenClaw configuration secure?" ``` ``` "Check my OpenClaw for known vulnerabilities" ``` ### CVE-2026-25253 Detection Check if your OpenClaw instance is vulnerable to the WebSocket hijack RCE (CVSS 8.8): ``` "Am I vulnerable to CVE-2026-25253?" ``` ``` "Check for the OpenClaw WebSocket vulnerability" ``` ### Skill Scanning Scan installed skills for malicious code patterns (command injection, data exfiltration, obfuscated payloads, crypto mining): ``` "Scan my installed skills for malware" ``` ``` "Is the weather-bot skill safe?" ``` ``` "Check all my skills for security issues" ``` ### Credential Audit Check for exposed credentials, weak file permissions, and plaintext storage: ``` "Are my API keys and tokens stored securely?" ``` ``` "Check my credential file permissions" ``` ### Configuration Hardening Get specific recommendations for hardening your OpenClaw config: ``` "How do I harden my OpenClaw configuration?" ``` ``` "What security settings should I change?" ``` ## How It Works This skill uses HackMyAgent, an open-source security scanner with 47 OpenClaw-specific checks across these categories: ### Skill Security (6 checks) | Check | What It Detects | |-------|-----------------| | SKILL-001 | Command injection via shell execution | | SKILL-002 | Dynamic code execution (eval, Function, vm) | | SKILL-003 | Data exfiltration to external endpoints | | SKILL-004 | Obfuscated code (base64, hex, charcode) | | SKILL-005 | Crypto mining indicators | | SKILL-006 | Path traversal outside skill directory | ### Credential Security (4 checks) | Check | What It Detects | |-------|-----------------| | CRED-001 | Credentials exposed via gateway API | | CRED-002 | Credential files with world-readable permissions | | CRED-003 | Plaintext credential storage without encryption | | CRED-004 | Timing side-channel in authentication | ### Gateway Security (4 checks) | Check | What It Detects | |-------|-----------------| | GW-001 | Missing rate limiting on endpoints | | GW-002 | SSRF-vulnerable URL fetch handlers | | GW-003 | Missing or incomplete security headers | | GW-004 | CVE-2026-25253 WebSocket hijack vulnerability | ### Supply Chain (4 checks) | Check | What It Detects | |-------|-----------------| | SC-001 | npm install without --ignore-scripts | | SC-002 | Unpinned or pre-release dependencies | | SC-003 | Missing skill signing or hash verification | | SC-004 | Known ClawHavoc malicious skill patterns | ## Running Scans When asked to perform a scan, run the following commands: ### Full Security Audit ```bash npx hackmyagent secure ~/.openclaw ``` ### Scan a Specific Skill ```bash npx hackmyagent scan --skill <skill-name> ``` ### CVE Detection Only ```bash npx hackmyagent scan --cve ~/.openclaw ``` ### Configuration Audit ```bash npx hackmyagent audit ~/.openclaw/config.json5 ``` ### Generate Security Report ```bash npx hackmyagent secure ~/.openclaw --format html --output security-report.html ``` Output formats: text, json, sarif, html, asp ## Security Recommendations When providing recommendations, reference these priority levels: ### Do Immediately 1. **Update OpenClaw** to the latest version (patches CVE-2026-25253, credential redaction, timing-safe auth, lifecycle script blocking) 2. **Run `npx hackmyagent secure`** to identify your current exposure 3. **Review installed skills** — remove any you do not actively use 4. **Check file permissions** — credential files should be 0600, not world-readable ### Configuration Changes Recommend these config.json5 changes when relevant: - Set `gateway.auth` to a strong token (32+ characters, randomly generated) - Set `gateway.host` to `127.0.0.1` (loopback only) unless remote access is required - Disable unused channel integrations - Set `plugins.allowUnsafe` to false - Enable Docker sandbox mode when available ### For Skill Publishers - Do not hardcode API keys in skill code — use environment variables - Declare minimum required permissions in SKILL.md frontmatter - Do not use eval(), Function(), or child_process.exec() with user input - Do not fetch external URLs at install time ## Interpreting Results When presenting scan results to the user: - **CRITICAL findings** require immediate action — explain the specific risk and provide the fix command - **HIGH findings** should be addressed before deploying to production - **MEDIUM findings** are defense-in-depth improvements - **LOW findings** are best-practice recommendations Always explain findings in plain language. Not every user is a security expert. State what the risk is, who could exploit it, and exactly how to fix it. ## Background This skill is built by OpenA2A (opena2a.org), the team behind 6 merged security patches in OpenClaw main: | PR | Fix | |----|-----| | #9806 | Skill code safety scanner (19 detection rules, +1,721 lines) | | #9858 | Credential redaction for gateway WebSocket responses | | #10525 | Path traversal fix in A2UI file serving | | #10527 | Timing-safe comparison for hook token auth | | #10528 | Blocked npm lifecycle scripts during plugin install | | #10529 | File permission enforcement on WhatsApp credentials | Scanner: https://www.npmjs.com/package/hackmyagent Source: https://github.com/opena2a-org/hackmyagent Threat model: https://github.com/openclaw/trust/pull/7
Related Skills
Cybersecurity Risk Assessment
You are a cybersecurity risk assessment specialist. When the user needs a security audit, threat assessment, or compliance review, follow this framework.
afrexai-cybersecurity-engine
Complete cybersecurity assessment, threat modeling, and hardening system. Use when conducting security audits, threat modeling, penetration testing, incident response, or building security programs from scratch. Works with any stack — zero external dependencies.
security-guardian
Automated security auditing for OpenClaw projects. Scans for hardcoded secrets (API keys, tokens) and container vulnerabilities (CVEs) using Trivy. Provides structured reports to help maintain a clean and secure codebase.
SX-security-audit
全方位安全审计技能。检查文件权限、环境变量、依赖漏洞、配置文件、网络端口、Git 安全、Shell 安全、macOS 安全、密钥检测等。支持 CLI 参数、JSON 输出、配置文件。当用户要求"安全检查"、"漏洞扫描"、"权限检查"、"安全审计"时使用此技能。
security-audit-hand
自主安全审计 - 定期检查系统安全、发现风险、生成报告
Agent Security Auditor
Scans ERC-8004 agents for security vulnerabilities and generates comprehensive security reports.
security-sentinel
Scan the workspace for security vulnerabilities, exposed secrets, and misconfigurations.
AURA Security Scanner
Scan AI agent skills for malware, credential theft, prompt injection, and dangerous permissions before installing them
openclaw-security
Unified security suite for agent workspaces. Installs, configures, and orchestrates all 11 OpenClaw security tools in one command — integrity, secrets, permissions, network, audit trail, signing, supply chain, credentials, injection defense, compliance, and incident response.
openclaw-security-policy-check
OpenClaw 网关安全自动化审计与配置检查工具。自动检查 OpenClaw 配置文件中的常见安全风险,执行安全审计。适用于:
ants-openclaw-security-audit
审计本地 openclaw 的安全配置与运行暴露面。用于检查、验证、解释和总结当前机器或沙箱中的 openclaw 相关安全设置,包括代理配置、sandbox 配置、docker 端口暴露、gateway 检查、文件权限、workspace symlink 风险、本地监听端口以及整体本地安全状态。
aws-terraform-security-reviewer
Review Terraform plans and HCL files for AWS security misconfigurations before deployment