Crawler Summary

clawguard answer-first brief

Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled scan", "audit host security", "audit this skill", "check agent integrity", "security report", "monitor agent". --- name: clawguard version: 1.1.0 description: > Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.

Freshness

Last checked 2/25/2026

Best For

clawguard is best for lead, a, results workflows where OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack

Claim this agent
Agent DossierGitHubSafety: 89/100

clawguard

Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled scan", "audit host security", "audit this skill", "check agent integrity", "security report", "monitor agent". --- name: clawguard version: 1.1.0 description: > Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled

OpenClawself-declared

Public facts

3

Change events

0

Artifacts

0

Freshness

Feb 25, 2026

Verifiededitorial-contentNo verified compatibility signals

Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.

Trust evidence available

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Feb 25, 2026

Vendor

Crustysecurity

Artifacts

0

Benchmarks

0

Last release

Unpublished

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.

Setup snapshot

git clone https://github.com/silentcool/crusty-security.git
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Crustysecurity

profilemedium
Observed Feb 25, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

OpenClaw

contractmedium
Observed Feb 25, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB OPENCLEW

Extracted files

0

Examples

3

Snippets

0

Languages

typescript

Parameters

Executable Examples

bash

bash scripts/scan_file.sh -r /data/workspace      # Full recursive scan
bash scripts/scan_file.sh -r --incremental /data/workspace  # Skip unchanged files

bash

bash scripts/scan_file.sh --quarantine /path/to/file   # Move to quarantine
# Quarantine location: $CLAWGUARD_QUARANTINE (default: /tmp/clawguard_quarantine)
# Manifest: /tmp/clawguard_quarantine/manifest.json

bash

# View quarantined files
cat /tmp/clawguard_quarantine/manifest.json | python3 -m json.tool

# Restore a false positive
mv /tmp/clawguard_quarantine/<file> /original/path/

# Permanently delete
rm -rf /tmp/clawguard_quarantine/*

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB OPENCLEW

Docs source

GITHUB OPENCLEW

Editorial quality

ready

Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled scan", "audit host security", "audit this skill", "check agent integrity", "security report", "monitor agent". --- name: clawguard version: 1.1.0 description: > Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled

Full README

name: clawguard version: 1.1.0 description: > Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled scan", "audit host security", "audit this skill", "check agent integrity", "security report", "monitor agent". homepage: https://crustysecurity.com metadata: {"openclaw":{"requires":{"bins":["bash","python3"]}}}

Crusty Security — Security & Threat Scanning

Overview

Crusty Security protects OpenClaw agents against real threats: malware in downloaded files, compromised skills from ClawHub, data exfiltration, prompt injection payloads, and host-level compromise. It uses ClamAV for file scanning and AI-agent-specific static analysis.

Threat model: The agent itself is the attack surface. Prompt injection can lead to code execution. Malicious skills run with agent privileges. Crusty Security protects both the host AND the agent's integrity.

Quick Reference

| Task | Command | |------|---------| | Install ClamAV | bash scripts/install_clamav.sh | | Scan a file | bash scripts/scan_file.sh /path/to/file | | Scan a directory | bash scripts/scan_file.sh -r /path/to/dir | | Audit a skill | bash scripts/audit_skill.sh /path/to/skill/ | | Host security audit | bash scripts/host_audit.sh | | Monitor agent integrity | bash scripts/monitor_agent.sh | | Generate security report | bash scripts/generate_report.sh |

All scripts output JSON. All scripts support --help. All paths are relative to this skill directory.

Setup (First Run)

Run bash setup.sh — that's it. ClamAV installs automatically if missing, including on first scan.

See references/setup.md for detailed configuration.

Dashboard Connection

If your human has configured CRUSTY_API_KEY, the skill sends scan results to the Crusty Security dashboard (crustysecurity.com):

  • Heartbeats are sent every 5 minutes automatically — keeps the dashboard showing agent status
  • Scan results are pushed when you add --push to scan commands
  • ClawHub sync sends skill inventory with python3 scripts/clawhub_sync.py --push
  • If CRUSTY_API_KEY is NOT set, everything works locally — no data is sent anywhere
  • The dashboard never connects TO the agent — data flows one way (agent → dashboard)

Scanning Workflows

File Scanning

Triggers: "scan this file", "is this safe", "check this download", "virus scan"

  1. Run bash scripts/scan_file.sh <path> for ClamAV local scan
  2. Report results:
    • ✅ Clean — "No threats detected. Scanned with ClamAV, signatures from [date]."
    • ⚠️ Suspicious — "Low-confidence detection by ClamAV. Recommend quarantine for review."
    • 🚨 Malicious — "Threat detected: [name]. Recommend quarantine. Options: quarantine, delete, or ignore."

For directories:

bash scripts/scan_file.sh -r /data/workspace      # Full recursive scan
bash scripts/scan_file.sh -r --incremental /data/workspace  # Skip unchanged files

Quarantine workflow:

bash scripts/scan_file.sh --quarantine /path/to/file   # Move to quarantine
# Quarantine location: $CLAWGUARD_QUARANTINE (default: /tmp/clawguard_quarantine)
# Manifest: /tmp/clawguard_quarantine/manifest.json

Important notes:

  • ClamAV prefers clamdscan (daemon) when available, falls back to clamscan
  • Max file size default: 200M (configurable via CLAWGUARD_MAX_FILE_SIZE)
  • Encrypted archives: flagged as "unscanned" — cannot inspect contents
  • Large archives: ClamAV handles zip, rar, 7z, tar, gz natively

Skill Auditing (Supply Chain Security)

Triggers: "audit this skill", "is this skill safe", "check skill security", "scan skill"

bash scripts/audit_skill.sh /path/to/skill/directory/

What it checks:

  • 🔴 Critical: curl/wget piped to shell, reverse shell patterns, crypto mining indicators
  • 🟠 High: eval/exec with dynamic input, base64 decode patterns, data exfiltration endpoints (webhook.site, ngrok, etc.), credential harvesting, binary executables, agent config modification
  • 🟡 Medium: hidden files, system file access, hardcoded IPs, obfuscated code, persistence mechanisms (cron, systemd)
  • 🔵 Low/Info: large skill size, credential references in docs

Output: Risk score (low/medium/high/critical) + detailed findings with evidence.

When to use:

  • Before installing any skill from ClawHub
  • When reviewing third-party skill contributions
  • Periodically on all installed skills: for d in /data/workspace/skills/*/; do bash scripts/audit_skill.sh "$d"; done

Host Security Audit

Triggers: "audit host", "security audit", "check host security"

bash scripts/host_audit.sh or bash scripts/host_audit.sh --deep

Checks:

  • Suspicious cron jobs (curl piping, base64, reverse shells)
  • Unexpected listening ports
  • Recently modified system files (deep mode)
  • SSH key audit (excessive keys, no-comment keys, root login)
  • Sensitive file permissions (world-writable /etc/passwd, etc.)
  • ClamAV signature freshness
  • openclaw security audit (if available)

Output: Posture score (0-100) + findings. Score deductions: critical (-25), high (-15), medium (-10), low (-5).

Agent Behavior Monitoring

Triggers: "check agent integrity", "monitor agent", "is the agent compromised"

bash scripts/monitor_agent.sh

What it checks:

  • Recent modifications to AGENTS.md, SOUL.md, MEMORY.md, TOOLS.md, USER.md
  • Memory file churn (>10 files modified = suspicious)
  • Unexpected cron jobs (anything not clawguard/freshclam/standard maintenance)
  • Suspicious outbound connections (IRC ports, backdoor ports, Tor)
  • Files created outside workspace (/tmp executables, home directory changes)
  • Suspicious processes (xmrig, nc -l, ncat, socat, chisel)
  • High CPU processes (>80% — potential miners)
  • Sensitive file exposure (.env files, world-readable SSH keys)

Output: Status (healthy / warnings_present / compromised_indicators) + findings.

Security Report Generation

Triggers: "security report", "threat report", "posture report"

bash scripts/generate_report.sh or bash scripts/generate_report.sh --days 30 --output report.md

Compiles all recent scan results into a markdown security posture report with:

  • Scan summary (total, clean, threats, errors)
  • Threat details with file paths and actions taken
  • Security posture score with emoji indicators
  • Recommendations (missing tools, scan schedules)

Automatic Scheduled Scanning

Cron jobs are auto-installed by setup.sh via scripts/install_crons.sh. No manual setup needed. The install script uses the openclaw cron add CLI and is idempotent (skips existing crusty-* jobs).

| Name | Schedule | What it does | |------|----------|-------------| | crusty-heartbeat | Every hour (0 * * * *) | Dashboard heartbeat — keeps agent status alive | | crusty-daily-scan | Daily 3 AM UTC | Incremental workspace scan + agent integrity monitor | | crusty-weekly-full | Sunday 3 AM UTC | Full workspace scan + host audit + report | | crusty-monthly-deep | 1st of month 4 AM UTC | Deep host security audit |

To reinstall or reset crons: bash scripts/install_crons.sh --force

False Positive Handling

ClamAV has moderate false positive rates. Strategy:

  1. Single ClamAV detection, known safe source → Likely false positive. Log and skip.
  2. ClamAV detection, unknown source → Quarantine and investigate.
  3. ClamAV detection + skill audit findings → Real threat. Quarantine immediately.

To handle a false positive:

  • Submit to ClamAV: https://www.clamav.net/reports/fp
  • Document in scan logs for future reference

Quarantine Procedures

Location: $CLAWGUARD_QUARANTINE (default: /tmp/clawguard_quarantine) Manifest: manifest.json in quarantine directory tracks original paths and timestamps.

# View quarantined files
cat /tmp/clawguard_quarantine/manifest.json | python3 -m json.tool

# Restore a false positive
mv /tmp/clawguard_quarantine/<file> /original/path/

# Permanently delete
rm -rf /tmp/clawguard_quarantine/*

Never use clamscan --remove. Always quarantine first, verify, then delete.

Offline Mode

Crusty Security works fully offline with reduced capability:

  • ✅ ClamAV scanning (local signatures)
  • ✅ Skill auditing (static analysis, no network needed)
  • ✅ Host auditing (local checks)
  • ✅ Agent monitoring (local checks)
  • ⚠️ ClamAV signatures may be stale (check freshness in host audit)

Resource-Constrained Environments (Raspberry Pi)

For hosts with <2GB RAM:

  • install_clamav.sh auto-detects low RAM and skips daemon mode
  • Use clamscan (on-demand) instead of clamd (daemon)
  • Use incremental scanning (--incremental) to reduce scan time
  • Skill auditing and agent monitoring have minimal resource requirements

For hosts with <1GB RAM:

  • Consider skipping ClamAV entirely
  • Use skill auditing + agent monitoring only
  • These tools are shell/Python with negligible memory usage

Environment Variables

| Variable | Default | Description | |----------|---------|-------------| | CRUSTY_API_KEY | (none) | Dashboard API key | | CRUSTY_DASHBOARD_URL | (none) | Dashboard URL | | CLAWGUARD_QUARANTINE | /tmp/clawguard_quarantine | Quarantine directory | | CLAWGUARD_LOG_DIR | /tmp/clawguard_logs | Scan log directory | | CLAWGUARD_MAX_FILE_SIZE | 200M | Max file size to scan | | CLAWGUARD_WORKSPACE | /data/workspace | Agent workspace path |

Incident Response

When a real threat is confirmed, see references/remediation.md for the full checklist. Quick summary:

  1. Quarantine the file immediately
  2. Assess scope — was it executed? Did it modify other files?
  3. Check persistence — cron jobs, SSH keys, shell profiles, systemd services
  4. Check exfiltration — outbound connections, DNS queries, API key usage
  5. Rotate credentials if any were potentially exposed
  6. Full scanbash scripts/scan_file.sh -r /
  7. Document the incident

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

MissingGITHUB OPENCLEW

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

OpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/silentcool-crusty-security/snapshot"
curl -s "https://xpersona.co/api/v1/agents/silentcool-crusty-security/contract"
curl -s "https://xpersona.co/api/v1/agents/silentcool-crusty-security/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITHUB_REPOSactivepieces

Rank

70

AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents

Traction

No public download signal

Freshness

Updated 2d ago

OPENCLAW
GITHUB_REPOScherry-studio

Rank

70

AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs

Traction

No public download signal

Freshness

Updated 5d ago

MCPOPENCLAW
GITHUB_REPOSAionUi

Rank

70

Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSCopilotKit

Rank

70

The Frontend for Agents & Generative UI. React + Angular

Traction

No public download signal

Freshness

Updated 23d ago

OPENCLAW
Machine Appendix

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/silentcool-crusty-security/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/silentcool-crusty-security/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/silentcool-crusty-security/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_OPENCLEW",
      "generatedAt": "2026-04-16T23:35:27.482Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "lead",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "a",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "results",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "commands",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "this",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "2",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "bash",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "skill",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "summary",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "schedules",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "logs",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "time",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "log",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:lead|supported|profile capability:a|supported|profile capability:results|supported|profile capability:commands|supported|profile capability:this|supported|profile capability:2|supported|profile capability:bash|supported|profile capability:skill|supported|profile capability:summary|supported|profile capability:schedules|supported|profile capability:logs|supported|profile capability:time|supported|profile capability:log|supported|profile"
}

Facts JSON

[
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Crustysecurity",
    "href": "https://crustysecurity.com",
    "sourceUrl": "https://crustysecurity.com",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-02-25T01:47:11.545Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-02-25T01:47:11.545Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[]

Sponsored

Ads related to clawguard and adjacent AI workflows.