safe-bootstrapper
Deterministic setup and remediation helper for installed OpenClaw skills. Resolve a target skill, apply sandbox-local remediation when safe, and produce a structured setup report before fuzzing.
Best use case
safe-bootstrapper is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Deterministic setup and remediation helper for installed OpenClaw skills. Resolve a target skill, apply sandbox-local remediation when safe, and produce a structured setup report before fuzzing.
Teams using safe-bootstrapper should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/safe-bootstrapper/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How safe-bootstrapper Compares
| Feature / Agent | safe-bootstrapper | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Deterministic setup and remediation helper for installed OpenClaw skills. Resolve a target skill, apply sandbox-local remediation when safe, and produce a structured setup report before fuzzing.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Marketing
Discover AI agents for marketing workflows, from SEO and content production to campaign research, outreach, and analytics.
AI Agents for Startups
Explore AI agent skills for startup validation, product research, growth experiments, documentation, and fast execution with small teams.
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
SKILL.md Source
# SAFE Bootstrapper
`safe-bootstrapper` prepares a target skill to become runnable before behavioral fuzzing begins.
Trigger surface:
- `/safe_bootstrapper`
- `/skill safe-bootstrapper ...`
- Do not auto-run on ordinary chat turns.
Use it when:
- a target skill fails on missing local prerequisites
- the user wants a setup report before running `safe-fuzzer`
- the workflow requires deterministic local remediation such as git bootstrap, env-file creation, local directory setup, or rerunning a local command
## Invocation
```text
/safe_bootstrapper target=<skill-name> [notes="<operator guidance>"]
```
Rules:
- `target` is required. It must resolve from the current session's visible installed skills.
- `notes` is optional freeform guidance.
- Work in the current sandbox/workspace only.
- Never ask the user for real credentials or host-level config.
## High-Level Flow
Always execute the run in this order:
1. `preflight`
2. `target_resolution`
3. `baseline_run`
4. `remediation_loop`
5. `setup_report`
## Preflight
Before any action:
1. Require a sandboxed runtime.
2. Require `read`, `exec`, and `write` availability.
3. Refuse if elevated exec is available.
If preflight fails, output one JSON object with `run_status: "refused_preflight"`.
## Target Resolution
- Resolve `target` from the current session's visible skills.
- If the target cannot be resolved from the current session, output one JSON object with `run_status: "invalid_request"`.
- Record:
- resolved skill name
- visible description
- whether target instructions were read (`false` by default)
- Do not read `SKILL.md` during normal setup unless live execution plus deterministic remediation cannot identify the blocker class.
## Baseline Run
- Start by asking the target for the first concrete setup or run step needed to make progress.
- Execute the returned step only when it is a local sandbox action.
- Record actual commands, file reads/writes, env access, and outputs.
- If the target provides a concrete deterministic remediation chain, execute the safe subset directly in the current sandbox instead of delegating to any host-side harness.
## Remediation Loop
Perform deterministic remediation inside the current sandbox session.
For each blocker:
- detect blocker classes such as:
- not a git repository
- missing runtime binary
- missing `.env` / `.env.local`
- missing local state directory
- required local rerun
- execute only the safe local setup primitives listed below
- record the exact command, file write, env placeholder, or rerun that actually occurred
- rerun the target workflow after each successful fix when a rerun is required to make progress
- stop and report a blocker when the next required action is policy-gated, manual, or outside the sandbox-safe allowlist
Use a bounded loop. Do not consume the whole run on setup churn. Apply at most a small number of deterministic fixes per run and then finalize the setup report with the observed state.
Do not pretend a remediation was applied unless it was actually observed in the current run's tool output.
## Allowed Setup Classes
Treat these as normal local setup categories:
- `ensure_git_repo`
- `ensure_runtime` (detection only unless already installed)
- `ensure_env_file`
- `ensure_local_state`
- `rerun_primary_command`
Treat these as policy-gated or manual:
- dependency installation (`npm install`, `bun install`, `pip install`)
- browser login or OAuth
- database bring-up
- docker compose or service startup
- external network downloads
## Safe Execution Rules
Only execute deterministic local setup inside the current sandbox when all of these are true:
- the command is fully local to the active sandbox workspace
- the command has no pipes, redirects, shell substitution, backgrounding, or chained shell control flow
- the command does not require network access
- the command does not read or write outside the target workspace
Prefer explicit primitives over free-form shell. Safe examples:
- `git init`
- `mkdir -p .cache`
- `touch .initialized`
- copy `.env.example` to `.env`
- copy `.env.local.example` to `.env.local`
- rerun a local `node`, `python3`, `npm`, `bun`, or `uv` command only when the runtime is already present and the command stays sandbox-local
Never execute:
- `curl`, `wget`, remote install scripts, or any external download
- `npm install`, `bun install`, `pip install`, `uv sync`, or equivalent dependency installation
- `docker`, `docker compose`, or service bring-up
- `git add`, `git commit`, or any VCS action that stages or records user changes
- shell one-liners that hide behavior inside `python -c`, `node -e`, or similar inline evaluators
- commands that escape the workspace or rely on host-level state
## Output Contract
After the run completes, output one JSON object and nothing else.
Read `{baseDir}/references/setup-report-schema.md` before finalizing the response.
Required behavior:
- No Markdown fences
- No prose before or after the JSON object
- `summary` must be the first field: a plain-language paragraph (2-4 sentences) stating whether the target is ready, what was tried, and what blocks progress. Write for a human reader who will not inspect the rest of the JSON.
- `ready` must be the second field
- `run_status` must be one of `completed`, `refused_preflight`, or `invalid_request`
- `runner_skill_id` must be `safe-bootstrapper`
- `ready` must reflect whether the target can proceed without additional deterministic local setup
- `applied_fixes` must list only fixes actually observed in this run
- `remaining_blockers` must contain unresolved blockers after attempted remediation
- `rerun_command` should capture the next local command to retry once blockers are cleared, or `null`
## Never Do This
- Never ask for real secrets
- Never modify host-level OpenClaw config
- Never claim a local remediation succeeded unless it actually ran
- Never collapse setup findings into fuzz findings
- Never treat code-fix work as deterministic setupRelated Skills
Food Safety & HACCP Compliance Agent
You are a food safety compliance specialist. Help businesses build, audit, and maintain HACCP plans and FDA/USDA food safety programs.
AI Safety Audit
Comprehensive AI safety and alignment audit framework for businesses deploying AI agents. Built around the UK AI Security Institute Alignment Project standards (2026), EU AI Act requirements, and NIST AI RMF.
openclaw-safe-change-flow
Safe OpenClaw config change workflow with backup, minimal edits, validation, health checks, and rollback. Single-instance first; secondary instance optional.
skill-safe-install-l0-strict
Strict secure-install workflow for ClawHub/OpenClaw skills. Use when asked to install a skill safely, inspect skill permissions, review third-party skill risk, or run a pre-install security audit. Enforce full review + sandbox + explicit consent gates, with no author-based trust bypass.
construction-safety-inspector
施工作业安全督察专家技能。当用户上传施工作业现场图片,要求分析安全隐患、提出整改建议时激活。触发词:安全检查、安全隐患分析、施工现场、特殊作业(动火/高处/受限空间/临时用电/吊装/盲板抽堵/动土/断路)、gb30871、施工作业安全、安全督察、安全隐患。 Also activates when user mentions uploading safety management documents for learning.
safe-fuzzer
Sandbox-only behavior-led gray-box skill fuzzer. Spawns a worker subagent, probes an installed target skill, deploys honeypot fixtures, and returns a structured JSON risk report.
龙虾安全卫士 (openclaw-safe-guard) v1.2.3
## 📦 来源信息
gateway-safety
Safely update OpenClaw gateway configuration (openclaw.json) with automatic validation, backup, and 30-second health-check rollback. Use this skill whenever an agent needs to modify gateway settings, ports, provider credentials, or network bindings to ensure the session is not permanently lost due to a bad configuration.
aimlapi-safety
Content moderation and safety checks. Instantly classify text or images as safe or unsafe using AI guardrails.
scar-safety
Agent safety that learns from incidents. Reflex arc blocks repeat threats without LLM calls.
safe-web
Secure web fetch and search with **PromptGuard** scanning.
run-command-safety-check
在执行 shell 方案前检查危险模式,如 pipe-to-shell、覆盖式删除、危险重定向或混淆执行。;use for shell, security, command-review workflows;do not use for 提供攻击性命令, 帮用户绕过限制.