Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled scan", "audit host security", "audit this skill", "check agent integrity", "security report", "monitor agent". --- name: clawguard version: 1.1.0 description: > Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Freshness
Last checked 2/25/2026
Best For
clawguard is best for lead, a, results workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled scan", "audit host security", "audit this skill", "check agent integrity", "security report", "monitor agent". --- name: clawguard version: 1.1.0 description: > Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled
Public facts
3
Change events
0
Artifacts
0
Freshness
Feb 25, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Feb 25, 2026
Vendor
Crustysecurity
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Setup snapshot
git clone https://github.com/silentcool/crusty-security.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Crustysecurity
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
3
Snippets
0
Languages
typescript
Parameters
bash
bash scripts/scan_file.sh -r /data/workspace # Full recursive scan bash scripts/scan_file.sh -r --incremental /data/workspace # Skip unchanged files
bash
bash scripts/scan_file.sh --quarantine /path/to/file # Move to quarantine # Quarantine location: $CLAWGUARD_QUARANTINE (default: /tmp/clawguard_quarantine) # Manifest: /tmp/clawguard_quarantine/manifest.json
bash
# View quarantined files cat /tmp/clawguard_quarantine/manifest.json | python3 -m json.tool # Restore a false positive mv /tmp/clawguard_quarantine/<file> /original/path/ # Permanently delete rm -rf /tmp/clawguard_quarantine/*
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled scan", "audit host security", "audit this skill", "check agent integrity", "security report", "monitor agent". --- name: clawguard version: 1.1.0 description: > Security and threat scanning skill for OpenClaw agents. Scans files and skills for malware. Monitors agent behavior for compromise indicators. Audits host security posture. Triggers on: "scan this file", "is this safe", "virus scan", "malware check", "security scan", "scan for threats", "check this download", "quarantine", "scan my system", "threat report", "scheduled
Crusty Security protects OpenClaw agents against real threats: malware in downloaded files, compromised skills from ClawHub, data exfiltration, prompt injection payloads, and host-level compromise. It uses ClamAV for file scanning and AI-agent-specific static analysis.
Threat model: The agent itself is the attack surface. Prompt injection can lead to code execution. Malicious skills run with agent privileges. Crusty Security protects both the host AND the agent's integrity.
| Task | Command |
|------|---------|
| Install ClamAV | bash scripts/install_clamav.sh |
| Scan a file | bash scripts/scan_file.sh /path/to/file |
| Scan a directory | bash scripts/scan_file.sh -r /path/to/dir |
| Audit a skill | bash scripts/audit_skill.sh /path/to/skill/ |
| Host security audit | bash scripts/host_audit.sh |
| Monitor agent integrity | bash scripts/monitor_agent.sh |
| Generate security report | bash scripts/generate_report.sh |
All scripts output JSON. All scripts support --help. All paths are relative to this skill directory.
Run bash setup.sh — that's it. ClamAV installs automatically if missing, including on first scan.
See references/setup.md for detailed configuration.
If your human has configured CRUSTY_API_KEY, the skill sends scan results to the Crusty Security dashboard (crustysecurity.com):
--push to scan commandspython3 scripts/clawhub_sync.py --pushCRUSTY_API_KEY is NOT set, everything works locally — no data is sent anywhereTriggers: "scan this file", "is this safe", "check this download", "virus scan"
bash scripts/scan_file.sh <path> for ClamAV local scanFor directories:
bash scripts/scan_file.sh -r /data/workspace # Full recursive scan
bash scripts/scan_file.sh -r --incremental /data/workspace # Skip unchanged files
Quarantine workflow:
bash scripts/scan_file.sh --quarantine /path/to/file # Move to quarantine
# Quarantine location: $CLAWGUARD_QUARANTINE (default: /tmp/clawguard_quarantine)
# Manifest: /tmp/clawguard_quarantine/manifest.json
Important notes:
CLAWGUARD_MAX_FILE_SIZE)Triggers: "audit this skill", "is this skill safe", "check skill security", "scan skill"
bash scripts/audit_skill.sh /path/to/skill/directory/
What it checks:
Output: Risk score (low/medium/high/critical) + detailed findings with evidence.
When to use:
for d in /data/workspace/skills/*/; do bash scripts/audit_skill.sh "$d"; doneTriggers: "audit host", "security audit", "check host security"
bash scripts/host_audit.sh or bash scripts/host_audit.sh --deep
Checks:
openclaw security audit (if available)Output: Posture score (0-100) + findings. Score deductions: critical (-25), high (-15), medium (-10), low (-5).
Triggers: "check agent integrity", "monitor agent", "is the agent compromised"
bash scripts/monitor_agent.sh
What it checks:
Output: Status (healthy / warnings_present / compromised_indicators) + findings.
Triggers: "security report", "threat report", "posture report"
bash scripts/generate_report.sh or bash scripts/generate_report.sh --days 30 --output report.md
Compiles all recent scan results into a markdown security posture report with:
Cron jobs are auto-installed by setup.sh via scripts/install_crons.sh. No manual setup needed. The install script uses the openclaw cron add CLI and is idempotent (skips existing crusty-* jobs).
| Name | Schedule | What it does |
|------|----------|-------------|
| crusty-heartbeat | Every hour (0 * * * *) | Dashboard heartbeat — keeps agent status alive |
| crusty-daily-scan | Daily 3 AM UTC | Incremental workspace scan + agent integrity monitor |
| crusty-weekly-full | Sunday 3 AM UTC | Full workspace scan + host audit + report |
| crusty-monthly-deep | 1st of month 4 AM UTC | Deep host security audit |
To reinstall or reset crons: bash scripts/install_crons.sh --force
ClamAV has moderate false positive rates. Strategy:
To handle a false positive:
Location: $CLAWGUARD_QUARANTINE (default: /tmp/clawguard_quarantine)
Manifest: manifest.json in quarantine directory tracks original paths and timestamps.
# View quarantined files
cat /tmp/clawguard_quarantine/manifest.json | python3 -m json.tool
# Restore a false positive
mv /tmp/clawguard_quarantine/<file> /original/path/
# Permanently delete
rm -rf /tmp/clawguard_quarantine/*
Never use clamscan --remove. Always quarantine first, verify, then delete.
Crusty Security works fully offline with reduced capability:
For hosts with <2GB RAM:
install_clamav.sh auto-detects low RAM and skips daemon modeclamscan (on-demand) instead of clamd (daemon)--incremental) to reduce scan timeFor hosts with <1GB RAM:
| Variable | Default | Description |
|----------|---------|-------------|
| CRUSTY_API_KEY | (none) | Dashboard API key |
| CRUSTY_DASHBOARD_URL | (none) | Dashboard URL |
| CLAWGUARD_QUARANTINE | /tmp/clawguard_quarantine | Quarantine directory |
| CLAWGUARD_LOG_DIR | /tmp/clawguard_logs | Scan log directory |
| CLAWGUARD_MAX_FILE_SIZE | 200M | Max file size to scan |
| CLAWGUARD_WORKSPACE | /data/workspace | Agent workspace path |
When a real threat is confirmed, see references/remediation.md for the full checklist. Quick summary:
bash scripts/scan_file.sh -r /Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/silentcool-crusty-security/snapshot"
curl -s "https://xpersona.co/api/v1/agents/silentcool-crusty-security/contract"
curl -s "https://xpersona.co/api/v1/agents/silentcool-crusty-security/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/silentcool-crusty-security/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/silentcool-crusty-security/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/silentcool-crusty-security/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-16T23:35:27.482Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "lead",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "a",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "results",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "commands",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "this",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "2",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "bash",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "skill",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "summary",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "schedules",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "logs",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "time",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "log",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:lead|supported|profile capability:a|supported|profile capability:results|supported|profile capability:commands|supported|profile capability:this|supported|profile capability:2|supported|profile capability:bash|supported|profile capability:skill|supported|profile capability:summary|supported|profile capability:schedules|supported|profile capability:logs|supported|profile capability:time|supported|profile capability:log|supported|profile"
}Facts JSON
[
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Crustysecurity",
"href": "https://crustysecurity.com",
"sourceUrl": "https://crustysecurity.com",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T01:47:11.545Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-25T01:47:11.545Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/silentcool-crusty-security/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[]
Sponsored
Ads related to clawguard and adjacent AI workflows.