Brought to you by Prompt Security, the Platform for AI Security
ClawSec is a complete security skill suite for AI agent platforms. It provides unified security monitoring, integrity verification, and threat intelligence-protecting your agent's cognitive architecture against prompt injection, drift, and malicious instructions.
- OpenClaw (MoltBot, Clawdbot, and clones) - Full suite with skill installer, file integrity protection, and security audits
- NanoClaw - Containerized WhatsApp bot security with MCP tools for advisory monitoring, signature verification, and file integrity
- π¦ Suite Installer - One-command installation of all security skills with integrity verification
- π‘οΈ File Integrity Protection - Drift detection and auto-restore for critical agent files (SOUL.md, IDENTITY.md, etc.)
- π‘ Live Security Advisories - Automated NVD CVE polling and community threat intelligence
- π Security Audits - Self-check scripts to detect prompt injection markers and vulnerabilities
- π Checksum Verification - SHA256 checksums for all skill artifacts
- Health Checks - Automated updates and integrity verification for all installed skills
Animated previews below are GIFs (no audio). Click any preview to open the full MP4 with audio.
Direct link: install-demo.mp4
Direct link: soul-guardian-demo.mp4
# Install the ClawSec security suite
npx clawhub@latest install clawsec-suiteAfter install, the suite can:
- Discover installable protections from the published skills catalog
- Verify release integrity using signed checksums
- Set up advisory monitoring and hook-based protection flows
- Add optional scheduled checks
Manual/source-first option:
Read https://github.com/prompt-security/clawsec/releases/latest/download/SKILL.md and follow the installation instructions.
Copy this instruction to your AI agent:
Install ClawSec with
npx clawhub@latest install clawsec-suite, then complete the setup steps from the generated instructions.
ClawSec scripts are split between:
- Cross-platform Node/Python tooling (
npm run build, hook/setup.mjs,utils/*.py) - POSIX shell workflows (
*.sh, most manual install snippets)
For Linux/macOS (bash/zsh):
- Use unquoted or double-quoted home vars:
export INSTALL_ROOT="$HOME/.openclaw/skills" - Do not single-quote expandable vars (for example, avoid
'$HOME/.openclaw/skills')
For Windows (PowerShell):
- Prefer explicit path building:
$env:INSTALL_ROOT = Join-Path $HOME ".openclaw\\skills"node "$env:INSTALL_ROOT\\clawsec-suite\\scripts\\setup_advisory_hook.mjs"
- POSIX
.shscripts require WSL or Git Bash.
Troubleshooting: if you see directories such as ~/.openclaw/workspace/$HOME/..., a home variable was passed literally. Re-run using an absolute path or an unquoted home expression.
ClawSec now supports NanoClaw, a containerized WhatsApp bot powered by Claude agents.
Location: skills/clawsec-nanoclaw/
A complete security suite adapted for NanoClaw's containerized architecture:
- 9 MCP Tools for agents to check vulnerabilities
- Advisory checking and browsing
- Pre-installation safety checks
- Skill package signature verification (Ed25519)
- File integrity monitoring
- Automatic Advisory Feed - Fetches and caches advisories every 6 hours
- Platform Filtering - Shows only NanoClaw-relevant advisories
- IPC-Based - Container-safe host communication
- Full Documentation - Installation guide, usage examples, troubleshooting
The feed now monitors NanoClaw-specific keywords:
NanoClaw- Direct product nameWhatsApp-bot- Core functionalitybaileys- WhatsApp client library dependency
Advisories can specify platforms: ["nanoclaw"] for platform-specific issues.
See skills/clawsec-nanoclaw/INSTALL.md for detailed setup instructions.
Quick integration:
- Copy skill to NanoClaw deployment
- Integrate MCP tools in container
- Add IPC handlers and cache service on host
- Restart NanoClaw
The clawsec-suite is a skill-of-skills manager that installs, verifies, and maintains security skills from the ClawSec catalog.
| Skill | Description | Installation | Compatibility |
|---|---|---|---|
| π‘ clawsec-feed | Security advisory feed monitoring with live CVE updates | β Included by default | All agents |
| π openclaw-audit-watchdog | Automated daily audits with email reporting | βοΈ Optional (install separately) | OpenClaw/MoltBot/Clawdbot |
| π» soul-guardian | Drift detection and file integrity guard with auto-restore | βοΈ Optional | All agents |
| π€ clawtributor | Community incident reporting | β Optional (Explicit request) | All agents |
β οΈ clawtributor is not installed by default as it may share anonymized incident data. Install only on explicit user request.
β οΈ openclaw-audit-watchdog is tailored for the OpenClaw/MoltBot/Clawdbot agent family. Other agents receive the universal skill set.
- Integrity Verification - Every skill package includes
checksums.jsonwith SHA256 hashes - Updates - Automatic checks for new skill versions
- Self-Healing - Failed integrity checks trigger automatic re-download from trusted releases
- Advisory Cross-Reference - Installed skills are checked against the security advisory feed
ClawSec maintains a continuously updated security advisory feed, automatically populated from NIST's National Vulnerability Database (NVD).
# Fetch latest advisories
curl -s https://clawsec.prompt.security/advisories/feed.json | jq '.advisories[] | select(.severity == "critical" or .severity == "high")'Canonical endpoint: https://clawsec.prompt.security/advisories/feed.json
Compatibility mirror (legacy): https://clawsec.prompt.security/releases/latest/download/feed.json
The feed polls CVEs related to:
- OpenClaw Platform:
OpenClaw,clawdbot,Moltbot - NanoClaw Platform:
NanoClaw,WhatsApp-bot,baileys - Prompt injection patterns
- Agent security vulnerabilities
NVD CVE Advisory:
{
"id": "CVE-2026-XXXXX",
"severity": "critical|high|medium|low",
"type": "vulnerable_skill",
"platforms": ["openclaw", "nanoclaw"],
"title": "Short description",
"description": "Full CVE description from NVD",
"published": "2026-02-01T00:00:00Z",
"cvss_score": 8.8,
"nvd_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-XXXXX",
"references": ["..."],
"action": "Recommended remediation"
}Community Advisory:
{
"id": "CLAW-2026-0042",
"severity": "high",
"type": "prompt_injection|vulnerable_skill|tampering_attempt",
"platforms": ["nanoclaw"],
"title": "Short description",
"description": "Detailed description from issue",
"published": "2026-02-01T00:00:00Z",
"affected": ["[email protected]"],
"source": "Community Report",
"github_issue_url": "https://github.com/.../issues/42",
"action": "Recommended remediation"
}Platform values:
"openclaw"- OpenClaw/Clawdbot/MoltBot only"nanoclaw"- NanoClaw only["openclaw", "nanoclaw"]- Both platforms- (empty/missing) - All platforms (backward compatible)
ClawSec uses automated pipelines for continuous security updates and skill distribution.
| Workflow | Trigger | Description |
|---|---|---|
| ci.yml | PRs to main, pushes to main |
Lint/type/build + skill test suites |
| pages-verify.yml | PRs to main |
Verifies Pages build and signing outputs without publishing |
| poll-nvd-cves.yml | Daily cron (06:00 UTC) | Polls NVD for new CVEs, updates feed |
| community-advisory.yml | Issue labeled advisory-approved |
Processes community reports into advisories |
| skill-release.yml | Skill tags + metadata PR changes | Validates version parity in PRs and publishes signed skill releases on tags |
| deploy-pages.yml | workflow_run after successful trusted CI/release or manual dispatch |
Builds and deploys the web interface to GitHub Pages |
| wiki-sync.yml | Pushes to main touching wiki/** |
Syncs wiki/ to the GitHub Wiki mirror |
When a skill is tagged (e.g., soul-guardian-v1.0.0), the pipeline:
- Validates - Checks
skill.jsonversion matches tag - Enforces key consistency - Verifies pinned release key references are consistent across repo PEMs and
skills/clawsec-suite/SKILL.md - Generates Checksums - Creates
checksums.jsonwith SHA256 hashes for all SBOM files - Signs + verifies - Signs
checksums.jsonand validates the generatedsigning-public.pemfingerprint against canonical repo key material - Releases - Publishes to GitHub Releases with all artifacts
- Supersedes Old Releases - Deletes older versions within the same major line (tags remain)
- Triggers Pages Update - Refreshes the skills catalog on the website
To prevent supply-chain drift, CI now fails fast when signing key references diverge.
Guardrail script:
scripts/ci/verify_signing_key_consistency.sh
What it checks:
skills/clawsec-suite/SKILL.mdinline public key fingerprint matchesRELEASE_PUBKEY_SHA256- Canonical PEM files all match the same fingerprint:
clawsec-signing-public.pemadvisories/feed-signing-public.pemskills/clawsec-suite/advisories/feed-signing-public.pem
- Generated public key in workflows matches canonical key:
release-assets/signing-public.pem(release workflow)public/signing-public.pem(pages workflow)
Where enforced:
.github/workflows/skill-release.yml.github/workflows/deploy-pages.yml
ClawSec follows semantic versioning. When a new version is released:
| Scenario | Behavior |
|---|---|
| New patch/minor (e.g., 1.0.1, 1.1.0) | Previous releases with same major version are deleted |
| New major (e.g., 2.0.0) | Previous major version (1.x.x) remains for backwards compatibility |
Why do old releases disappear?
When you release skill-v0.0.2, the previous skill-v0.0.1 release is automatically deleted to keep the releases page clean. Only the latest version within each major version is retained.
- Git tags are preserved - You can always recreate a release from an existing tag if needed
- Major versions coexist - Both
skill-v1.x.xandskill-v2.x.xlatest releases remain available for backwards compatibility
Each skill release includes:
checksums.json- SHA256 hashes for integrity verificationskill.json- Skill metadataSKILL.md- Main skill documentation- Additional files from SBOM (scripts, configs, etc.)
For feed/release signing rollout and operations guidance:
wiki/security-signing-runbook.md- key generation, GitHub secrets, rotation/revocation, incident responsewiki/migration-signed-feed.md- phased migration from unsigned feed, enforcement gates, rollback plan
ClawSec includes Python utilities for local skill development and validation.
Validates a skill folder against the required schema:
python utils/validate_skill.py skills/clawsec-feedChecks:
skill.jsonexists and is valid JSON- Required fields present (name, version, description, author, license)
- SBOM files exist and are readable
- OpenClaw metadata is properly structured
Generates checksums.json with SHA256 hashes for a skill:
python utils/package_skill.py skills/clawsec-feed ./distOutputs:
checksums.json- SHA256 hashes for verification
- Node.js 20+
- Python 3.10+ (for offline tools)
- npm
# Install dependencies
npm install
# Start development server
npm run dev# Populate skills catalog from local skills/ directory
./scripts/populate-local-skills.sh
# Populate advisory feed with real NVD CVE data
./scripts/populate-local-feed.sh --days 120
# Generate wiki llms exports from wiki/ (for local preview)
./scripts/populate-local-wiki.sh
# Direct generator entrypoint (used by predev/prebuild)
npm run gen:wiki-llmsNotes:
npm run devandnpm run buildautomatically regenerate wikillms.txtexports (predev/prebuildhooks).public/wiki/is generated output (local + CI) and is intentionally gitignored.
npm run buildβββ advisories/
β βββ feed.json # Main advisory feed (auto-updated from NVD)
βββ components/ # React components
βββ pages/ # Page components
βββ wiki/ # Source-of-truth docs (synced to GitHub Wiki)
βββ scripts/
β βββ generate-wiki-llms.mjs # wiki/*.md -> public/wiki/**/llms.txt
β βββ populate-local-feed.sh # Local CVE feed populator
β βββ populate-local-skills.sh # Local skills catalog populator
β βββ populate-local-wiki.sh # Local wiki llms export populator
β βββ release-skill.sh # Manual skill release helper
βββ skills/
β βββ clawsec-suite/ # π¦ Suite installer (skill-of-skills)
β βββ clawsec-feed/ # π‘ Advisory feed skill
β βββ clawsec-nanoclaw/ # π± NanoClaw platform security suite
β βββ clawsec-clawhub-checker/ # π§ͺ ClawHub reputation checks
β βββ clawtributor/ # π€ Community reporting skill
β βββ openclaw-audit-watchdog/ # π Automated audit skill
β βββ prompt-agent/ # π§ Prompt-focused protection workflows
β βββ soul-guardian/ # π» File integrity skill
βββ utils/
β βββ package_skill.py # Skill packager utility
β βββ validate_skill.py # Skill validator utility
βββ .github/workflows/
β βββ ci.yml # Cross-platform lint/type/build + tests
β βββ pages-verify.yml # PR-only pages build verification
β βββ poll-nvd-cves.yml # CVE polling pipeline
β βββ community-advisory.yml # Approved issue -> advisory PR
β βββ skill-release.yml # Skill release pipeline
β βββ wiki-sync.yml # Sync repo wiki/ to GitHub Wiki
β βββ deploy-pages.yml # Pages deployment
βββ public/ # Static assets + generated publish artifacts
We welcome contributions! See CONTRIBUTING.md for guidelines.
Found a prompt injection vector, malicious skill, or security vulnerability? Report it via GitHub Issues:
- Open a new issue using the Security Incident Report template
- Fill out the required fields (severity, type, description, affected skills)
- A maintainer will review and add the
advisory-approvedlabel - The advisory is automatically published to the feed as
CLAW-{YEAR}-{ISSUE#}
See CONTRIBUTING.md for detailed guidelines.
- Create a skill folder under
skills/ - Add
skill.jsonwith required metadata and SBOM - Add
SKILL.mdwith agent-readable instructions - Validate with
python utils/validate_skill.py skills/your-skill - Submit a PR for review
For all wiki content, edit files under wiki/ in this repository. The GitHub Wiki (<repo>.wiki.git) is synced from wiki/ by .github/workflows/wiki-sync.yml when wiki/** changes on main.
LLM exports are generated from wiki/ into public/wiki/:
/wiki/llms.txtis the LLM-ready export forwiki/INDEX.md(or a generated fallback index ifINDEX.mdis missing)./wiki/<page>/llms.txtis the LLM-ready export for that single wiki page.
- Source code: GNU AGPL v3.0 or later - See LICENSE for details.
- Fonts in
font/: Licensed separately - Seefont/README.md.
ClawSec Β· Prompt Security, SentinelOne
π¦ Hardening agentic workflows, one skill at a time.



