Brought to you by Prompt Security, the Platform for AI Security
ClawSec is a complete security skill suite for AI agent platforms. It provides unified security monitoring, integrity verification, and threat intelligence-protecting your agent's cognitive architecture against prompt injection, drift, and malicious instructions.
- OpenClaw (MoltBot, Clawdbot, and clones) - Full suite with skill installer, file integrity protection, and security audits
- NanoClaw - Containerized WhatsApp bot security with MCP tools for advisory monitoring, signature verification, and file integrity
- Hermes - Hermes-native security skills for signed advisory feed verification, advisory-aware guarded verification, deterministic attestation generation, fail-closed verification, and baseline drift detection
| Skill name | supported platform | security feed verification | config drift | agent self pen testing | supply-chain install verification |
|---|---|---|---|---|---|
| claw-release | OpenClaw | No | No | No | Yes |
| clawsec-clawhub-checker | OpenClaw + clawsec-suite integration | No | No | No | Yes |
| clawsec-feed | OpenClaw | Yes | No | No | Yes |
| clawsec-nanoclaw | NanoClaw | Yes | Yes | Yes | Yes |
| clawsec-scanner | OpenClaw | Yes | No | Yes | Yes |
| clawsec-suite | OpenClaw | Yes | Yes | No | Yes |
| clawtributor | OpenClaw | Yes | No | No | No |
| hermes-attestation-guardian | Hermes | Yes (signed advisory feed verification) | Yes | No | Limited (advisory preflight gating only; no artifact signature/provenance install verification) |
| openclaw-audit-watchdog | OpenClaw | No | No | Yes | No |
| soul-guardian | OpenClaw | No | Yes | No | No |
- π¦ Suite Installer - One-command installation of all security skills with integrity verification
- π‘οΈ File Integrity Protection - Drift detection and auto-restore for critical agent files (SOUL.md, IDENTITY.md, etc.)
- π‘ Live Security Advisories - Automated NVD CVE polling and community threat intelligence
- π Security Audits - Self-check scripts to detect prompt injection markers and vulnerabilities
- π Checksum Verification - SHA256 checksums for all skill artifacts
- Health Checks - Automated updates and integrity verification for all installed skills
Animated previews below are GIFs (no audio). Click any preview to open the full MP4 with audio.
Direct link: install-demo.mp4
Direct link: soul-guardian-demo.mp4
# Install the ClawSec security suite
npx clawhub@latest install clawsec-suiteAfter install, the suite can:
- Discover installable protections from the published skills catalog
- Verify release integrity using signed checksums
- Set up advisory monitoring and hook-based protection flows
- Add optional scheduled checks
Manual/source-first option:
Read https://github.com/prompt-security/clawsec/releases/latest/download/SKILL.md and follow the installation instructions.
Copy this instruction to your AI agent:
Install ClawSec with
npx clawhub@latest install clawsec-suite, then complete the setup steps from the generated instructions.
ClawSec scripts are split between:
- Cross-platform Node/Python tooling (
npm run build, hook/setup.mjs,utils/*.py) - POSIX shell workflows (
*.sh, most manual install snippets)
For Linux/macOS (bash/zsh):
- Use unquoted or double-quoted home vars:
export INSTALL_ROOT="$HOME/.openclaw/skills" - Do not single-quote expandable vars (for example, avoid
'$HOME/.openclaw/skills')
For Windows (PowerShell):
- Prefer explicit path building:
$env:INSTALL_ROOT = Join-Path $HOME ".openclaw\\skills"node "$env:INSTALL_ROOT\\clawsec-suite\\scripts\\setup_advisory_hook.mjs"
- POSIX
.shscripts require WSL or Git Bash.
Troubleshooting: if you see directories such as ~/.openclaw/workspace/$HOME/..., a home variable was passed literally. Re-run using an absolute path or an unquoted home expression.
Detailed platform and suite docs live in the wiki modules:
- NanoClaw: wiki/modules/nanoclaw-integration.md
- Hermes: wiki/modules/hermes-attestation-guardian.md
- ClawSec Suite (OpenClaw): wiki/modules/clawsec-suite.md
- CI/CD pipelines: wiki/modules/automation-release.md
Quick install links:
- NanoClaw install: skills/clawsec-nanoclaw/INSTALL.md
- Hermes skill package:
skills/hermes-attestation-guardian/ - Suite package:
skills/clawsec-suite/
ClawSec maintains a continuously updated security advisory feed, automatically populated from NIST's National Vulnerability Database (NVD).
# Fetch latest advisories
curl -s https://clawsec.prompt.security/advisories/feed.json | jq '.advisories[] | select(.severity == "critical" or .severity == "high")'Canonical endpoint: https://clawsec.prompt.security/advisories/feed.json
Compatibility mirror (legacy): https://clawsec.prompt.security/releases/latest/download/feed.json
The feed polls CVEs related to:
- OpenClaw Platform:
OpenClaw,clawdbot,Moltbot - NanoClaw Platform:
NanoClaw,WhatsApp-bot,baileys - Prompt injection patterns
- Agent security vulnerabilities
ClawSec enriches CVE advisories with exploitability context to help agents assess real-world risk beyond raw CVSS scores. Newly analyzed advisories can include:
- Exploit Evidence: Whether public exploits exist in the wild
- Weaponization Status: If exploits are integrated into common attack frameworks
- Attack Requirements: Prerequisites needed for successful exploitation (network access, authentication, user interaction)
- Risk Assessment: Contextualized risk level combining technical severity with exploitability
This feature helps agents prioritize vulnerabilities that pose immediate threats versus theoretical risks, enabling smarter security decisions.
NVD CVE Advisory:
{
"id": "CVE-2026-XXXXX",
"severity": "critical|high|medium|low",
"type": "vulnerable_skill",
"platforms": ["openclaw", "nanoclaw"],
"title": "Short description",
"description": "Full CVE description from NVD",
"published": "2026-02-01T00:00:00Z",
"cvss_score": 8.8,
"nvd_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-XXXXX",
"exploitability_score": "high|medium|low|unknown",
"exploitability_rationale": "Why this CVE is or is not likely exploitable in agent deployments",
"references": ["..."],
"action": "Recommended remediation"
}Community Advisory:
{
"id": "CLAW-2026-0042",
"severity": "high",
"type": "prompt_injection|vulnerable_skill|tampering_attempt",
"platforms": ["nanoclaw"],
"title": "Short description",
"description": "Detailed description from issue",
"published": "2026-02-01T00:00:00Z",
"affected": ["skill-name@1.0.0"],
"source": "Community Report",
"github_issue_url": "https://github.com/.../issues/42",
"action": "Recommended remediation"
}Platform values:
"openclaw"- OpenClaw/Clawdbot/MoltBot only"nanoclaw"- NanoClaw only["openclaw", "nanoclaw"]- Both platforms- (empty/missing) - All platforms (backward compatible)
CI/CD pipeline details were moved to the wiki module page:
Related operations docs:
ClawSec includes Python utilities for local skill development and validation.
Validates a skill folder against the required schema:
python utils/validate_skill.py skills/clawsec-feedChecks:
skill.jsonexists and is valid JSON- Required fields present (name, version, description, author, license)
- SBOM files exist and are readable
- OpenClaw metadata is properly structured
Generates checksums.json with SHA256 hashes for a skill:
python utils/package_skill.py skills/clawsec-feed ./distOutputs:
checksums.json- SHA256 hashes for verification
- Node.js 20+
- Python 3.10+ (for offline tools)
- npm
# Install dependencies
npm install
# Start development server
npm run dev# Populate skills catalog from local skills/ directory
./scripts/populate-local-skills.sh
# Populate advisory feed with real NVD CVE data
./scripts/populate-local-feed.sh --days 120
# Generate wiki llms exports from wiki/ (for local preview)
./scripts/populate-local-wiki.sh
# Direct generator entrypoint (used by predev/prebuild)
npm run gen:wiki-llmsNotes:
npm run devandnpm run buildautomatically regenerate wikillms.txtexports (predev/prebuildhooks).public/wiki/is generated output (local + CI) and is intentionally gitignored.
npm run buildβββ advisories/
β βββ feed.json # Main advisory feed
β βββ feed.json.sig # Detached signature for feed.json
β βββ feed-signing-public.pem # Public key for feed verification
βββ components/ # React components
βββ pages/ # Route/page components
βββ wiki/ # Source-of-truth docs (synced to GitHub Wiki)
βββ scripts/
β βββ generate-wiki-llms.mjs # wiki/*.md -> public/wiki/**/llms.txt
β βββ populate-local-feed.sh # Local CVE feed populator
β βββ populate-local-skills.sh # Local skills catalog populator
β βββ populate-local-wiki.sh # Local wiki llms export populator
β βββ prepare-to-push.sh # Local CI-style quality gate
β βββ validate-release-links.sh # Release link checks
β βββ release-skill.sh # Manual skill release helper
βββ skills/
β βββ claw-release/ # π Release automation workflow skill
β βββ clawsec-suite/ # π¦ Suite installer (skill-of-skills)
β βββ clawsec-feed/ # π‘ Advisory feed skill
β βββ clawsec-scanner/ # π Vulnerability scanner (deps + SAST + OpenClaw DAST)
β βββ clawsec-nanoclaw/ # π± NanoClaw platform security suite
β βββ clawsec-clawhub-checker/ # π§ͺ ClawHub reputation checks
β βββ clawtributor/ # π€ Community reporting skill
β βββ hermes-attestation-guardian/ # π‘οΈ Hermes attestation + drift verification
β βββ openclaw-audit-watchdog/ # π Automated audit skill
β βββ soul-guardian/ # π» File integrity skill
βββ utils/
β βββ package_skill.py # Skill packager utility
β βββ validate_skill.py # Skill validator utility
βββ .github/workflows/
β βββ ci.yml # Cross-platform lint/type/build + tests
β βββ pages-verify.yml # PR-only pages build/signing verification
β βββ poll-nvd-cves.yml # CVE polling pipeline
β βββ community-advisory.yml # Approved issue -> advisory PR
β βββ skill-release.yml # Skill release/signing pipeline
β βββ deploy-pages.yml # GitHub Pages deployment
β βββ wiki-sync.yml # Sync repo wiki/ to GitHub Wiki
β βββ codeql.yml # CodeQL security analysis
β βββ scorecard.yml # OpenSSF Scorecard checks
βββ public/ # Static assets + generated wiki exports
We welcome contributions! See CONTRIBUTING.md for guidelines.
Found a prompt injection vector, malicious skill, or security vulnerability? Report it via GitHub Issues:
- Open a new issue using the Security Incident Report template
- Fill out the required fields (severity, type, description, affected skills)
- A maintainer will review and add the
advisory-approvedlabel - The advisory is automatically published to the feed as
CLAW-{YEAR}-{ISSUE#}
See CONTRIBUTING.md for detailed guidelines.
- Create a skill folder under
skills/ - Add
skill.jsonwith required metadata and SBOM - Add
SKILL.mdwith agent-readable instructions - Validate with
python utils/validate_skill.py skills/your-skill - Submit a PR for review
For all wiki content, edit files under wiki/ in this repository. The GitHub Wiki (<repo>.wiki.git) is synced from wiki/ by .github/workflows/wiki-sync.yml when wiki/** changes on main.
LLM exports are generated from wiki/ into public/wiki/:
/wiki/llms.txtis the LLM-ready export forwiki/INDEX.md(or a generated fallback index ifINDEX.mdis missing)./wiki/<page>/llms.txtis the LLM-ready export for that single wiki page.
- Source code: GNU AGPL v3.0 or later - See LICENSE for details.
- Fonts in
font/: Licensed separately - Seefont/README.md.
ClawSec Β· Prompt Security, SentinelOne
π¦ Hardening agentic workflows, one skill at a time.



