Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Harden OpenClaw security on Ubuntu/Debian VPS. SSH hardening, UFW firewall, fail2ban, automatic updates, Docker security, credential rotation, and security audits. --- name: vps-security-hardening description: Harden OpenClaw security on Ubuntu/Debian VPS. SSH hardening, UFW firewall, fail2ban, automatic updates, Docker security, credential rotation, and security audits. --- VPS Security Hardening for OpenClaw Secure your OpenClaw deployment on a Ubuntu/Debian VPS with industry-standard hardening practices. What This Skill Does - **SSH hardening** - Disable root login, enforce Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Freshness
Last checked 2/25/2026
Best For
vps-security-hardening is best for current, adjust workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Harden OpenClaw security on Ubuntu/Debian VPS. SSH hardening, UFW firewall, fail2ban, automatic updates, Docker security, credential rotation, and security audits. --- name: vps-security-hardening description: Harden OpenClaw security on Ubuntu/Debian VPS. SSH hardening, UFW firewall, fail2ban, automatic updates, Docker security, credential rotation, and security audits. --- VPS Security Hardening for OpenClaw Secure your OpenClaw deployment on a Ubuntu/Debian VPS with industry-standard hardening practices. What This Skill Does - **SSH hardening** - Disable root login, enforce
Public facts
4
Change events
1
Artifacts
0
Freshness
Feb 25, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Feb 25, 2026
Vendor
Vemtrac
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Setup snapshot
git clone https://github.com/Vemtrac/vps-security-hardening.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Vemtrac
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
bash
bash scripts/audit.sh
bash
bash scripts/harden.sh
bash
bash scripts/audit.sh
bash
bash scripts/harden.sh
bash
bash scripts/audit.sh
bash
bash scripts/audit.sh
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Harden OpenClaw security on Ubuntu/Debian VPS. SSH hardening, UFW firewall, fail2ban, automatic updates, Docker security, credential rotation, and security audits. --- name: vps-security-hardening description: Harden OpenClaw security on Ubuntu/Debian VPS. SSH hardening, UFW firewall, fail2ban, automatic updates, Docker security, credential rotation, and security audits. --- VPS Security Hardening for OpenClaw Secure your OpenClaw deployment on a Ubuntu/Debian VPS with industry-standard hardening practices. What This Skill Does - **SSH hardening** - Disable root login, enforce
Secure your OpenClaw deployment on a Ubuntu/Debian VPS with industry-standard hardening practices.
bash scripts/audit.sh
Reports current security posture across all hardening areas. No changes made.
bash scripts/harden.sh
Interactive script with confirmations before each major step. Safe to re-run.
See references/hardening-guide.md for detailed instructions on:
Three recommended security profiles:
By default, UFW is configured to allow:
All other inbound traffic is denied.
Unattended-upgrades will automatically:
You can adjust frequency and reboot behavior in /etc/apt/apt.conf.d/50unattended-upgrades.
bash scripts/audit.sh
Understand current state before making changes. Shows:
Decide which profile fits your use case:
bash scripts/harden.sh
Interactive prompts for each step. You control what gets applied.
Re-run audit to confirm hardening was applied:
bash scripts/audit.sh
sudo ufw status verbosesudo fail2ban-client statusls -la ~/.ssh/If you lose SSH access after changing the port:
sudo cat /etc/ssh/sshd_config | grep Portsudo systemctl restart sshIf OpenClaw becomes unreachable after firewall changes:
sudo ufw statussudo ufw allow 9999/tcpsudo ufw reloadIf legitimate traffic gets blocked:
sudo fail2ban-client status/etc/fail2ban/jail.local, add ignoreip = 1.2.3.4/32sudo systemctl restart fail2ban✅ Host OS hardening (SSH, firewall, updates, intrusion prevention)
✅ Container security (Docker)
✅ Credential rotation procedures
✅ Audit and monitoring setup
❌ Application-level security (OpenClaw configuration itself)
❌ TLS certificate management
❌ Data backup and recovery
❌ DDoS mitigation (beyond basic firewall rules)
❌ Compliance frameworks (PCI-DSS, HIPAA, SOC2)
For these, consult additional resources or a security professional.
Check current security posture. Non-destructive. Reports:
Usage:
bash scripts/audit.sh
Apply hardening steps interactively. Each step requires confirmation.
Usage:
bash scripts/harden.sh
Prompts for:
All changes are logged to /var/log/vps-hardening.log.
See these files for deep-dive information on specific topics.
This skill is maintained by Vemtrac. For questions or improvements, contact hello@vemtrac.com.
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/snapshot"
curl -s "https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/contract"
curl -s "https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-16T23:43:45.477Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "current",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "adjust",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:current|supported|profile capability:adjust|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Vemtrac",
"href": "https://github.com/Vemtrac/vps-security-hardening",
"sourceUrl": "https://github.com/Vemtrac/vps-security-hardening",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T01:46:57.347Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-25T01:46:57.347Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/vemtrac-vps-security-hardening/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to vps-security-hardening and adjacent AI workflows.