Back to home

Category

Security & Risk

Includes installation checks, configuration review, code security, deployment security, and on-chain risk detection.

Curated

Featured

Start with the most representative picks

These featured skills are the best place to begin when you want a quick understanding of what this category is best at.

Featured

Skill Vetter

Open original link
Skill AuditPre-Install CheckPermission ScopeRed FlagsLow-Barrier Security

Overview

Checks source, permission scope, suspicious patterns, and risk level before installing a skill.

Use cases

Reviewing an unfamiliar skill before installation and auditing third-party skills.

Audience

General users, OpenClaw or ClawHub users, platform reviewers, and technical leads.

Why it stands out

A perfect fit for a 'review before install' workflow and website positioning.

Featured

Openclaw Security Audit

Open original link
OpenClaw AuditDeployment CheckConfig RiskCredential ExposureHardening Advice

Overview

Audits OpenClaw deployments for configuration mistakes, exposed surfaces, and leakage risks.

Use cases

Post-deployment security review and hardening for self-hosted setups.

Audience

Self-hosted OpenClaw users, administrators, and technical teams.

Why it stands out

Highly aligned with the OpenClaw ecosystem and real deployment scenarios.

More Picks

Broader coverage for related needs

These additional recommendations help you explore adjacent use cases once you have the main direction in mind.

More picks

Security Auditor

Open original link
Code SecurityOWASPAuthenticationInput ValidationWeb Security

Overview

Reviews code and web applications for common security issues.

Use cases

Code reviews and security checks before launch.

Audience

Developers, security engineers, and technical leads.

Why it stands out

A better fit for developer-oriented code security checks.

More picks

Security Audit Toolkit

Open original link
Dependency ScanSecret DetectionTLS CheckFile PermissionsInfra Audit

Overview

Checks dependency vulnerabilities, hardcoded secrets, SSL/TLS issues, and permission problems.

Use cases

Auditing repositories, checking for secrets, and running infrastructure security reviews.

Audience

Developers, DevOps engineers, and security engineers.

Why it stands out

Comprehensive coverage, though the usage threshold is slightly higher.

More picks

Lobster Security Guard

Open original link
Chinese Security AuditStatic Skill ScanPermission RiskDependency RiskGitHub Review

Overview

Runs static security scans on skills and outputs a Chinese risk report.

Use cases

Reviewing local skills and scanning third-party skills before use.

Audience

Chinese-speaking users and OpenClaw users.

Why it stands out

Especially useful for Chinese-speaking users who want clearer security reporting.

More picks

Quick Intel Token Security Scanner

Open original link
Web3 SecurityToken RiskHoneypot DetectionContract ScanPre-Buy Check

Overview

Checks whether a token has honeypot behavior, scam patterns, or other smart-contract risks.

Use cases

Scanning a token before buying and reviewing suspicious projects.

Audience

Web3 users, traders, and on-chain researchers.

Why it stands out

A useful complementary pick for Web3-specific risk assessment.