名称: security-audit
描述: "为 OpenClaw/ClawHub 技能与仓库提供故障关闭式安全审计:在启用或安装前进行 trufflehog 密钥扫描、semgrep SAST、提示注入/持久化信号检测以及供应链卫生检查。"
元数据: {"openclaw":{"emoji":"🛡️","requires":{"bins":["jq","trufflehog","semgrep","python3"]},"install":[{"id":"apt-jq","kind":"apt","package":"jq","bins":["jq"],"label":"安装 jq (apt)"},{"id":"apt-ghog","kind":"apt","package":"python3","bins":["python3"],"label":"安装 Python 3 (apt)"},{"id":"apt-trufflehog","kind":"apt","package":"trufflehog","bins":["trufflehog"],"label":"安装 trufflehog (apt)"},{"id":"pipx-semgrep","kind":"shell","label":"安装 semgrep (pipx)","command":"python3 -m pip install --user pipx && python3 -m pipx ensurepath && pipx install semgrep"},{"id":"brew-jq","kind":"brew","formula":"jq","bins":["jq"],"label":"安装 jq (brew)"},{"id":"brew-trufflehog","kind":"brew","formula":"trufflehog","bins":["trufflehog"],"label":"安装 trufflehog (brew)"},{"id":"brew-semgrep","kind":"brew","formula":"semgrep","bins":["semgrep"],"label":"安装 semgrep (brew)"}]}}
一个专为代码库及 OpenClaw/ClawHub 技能设计的、故障关闭的审计工作流。
它不试图回答“这个技能是否有效?”,而是试图回答:“这个技能是否会背叛系统?”
本技能的脚本整合了多层检查:
任意一层检查失败,整体审计结果即为 FAIL。
在本技能文件夹中执行(使用 bash 以确保即使通过 zip 下载丢失了可执行权限也能运行):
bash scripts/run_audit_json.sh <路径>
示例:
bash scripts/run_audit_json.sh . > /tmp/audit.json
jq '.ok, .tools' /tmp/audit.json
设置严格等级(默认:standard):
OPENCLAW_AUDIT_LEVEL=standard bash scripts/run_audit_json.sh <路径>
OPENCLAW_AUDIT_LEVEL=strict bash scripts/run_audit_json.sh <路径>
OPENCLAW_AUDIT_LEVEL=paranoid bash scripts/run_audit_json.sh <路径>
standard:实用的严格默认值(需要锁文件;安装钩子/持久化/提示注入信号检测失败)strict:更多模式被视为硬性 FAIL(例如,压缩/混淆文件)paranoid:不允许“尽力而为”的哈希失败;采用更多故障关闭行为对于严格/隔离工作流,要求仓库根目录提供机器可读的意图/权限清单:
openclaw-skill.json如果仓库/技能未提供此清单,恶意审计应将其视为 FAIL。
详见:docs/OPENCLAW_SKILL_MANIFEST_SCHEMA.md。
Docker 在此是可选的。本技能可用于无需 Docker 的静态审计。
如需执行任何生成/不可信的代码,建议在单独的沙箱工作流中运行。
scripts/run_audit_json.sh — 主 JSON 审计运行器scripts/hostile_audit.py — 提示注入/持久化/依赖卫生扫描器scripts/security_audit.sh — 便捷包装器(始终返回 JSON,永不返回非零值)openclaw-skill.json — 机器可读的意图/权限清单