Category
Security
Security scanning, vulnerability assessment, and audit tools. These skills help identify security issues in codebases, dependencies, and configurations.
447 skills in this category
samma-suit
openclaw/skills
100Add 8 security governance layers to your OpenClaw agent — budget controls, permissions, audit logging, kill switch, identity signing, skill vetting, process isolation, and gateway protection.
SKILLPASSING0 Findingsabout 2 months agoperf-auditor
openclaw/skills
100Run a Lighthouse performance audit with AI fix suggestions. Use when your site is slow and you need actionable fixes.
SKILLPASSING0 Findingsabout 2 months agoseo-audit
openclaw/skills
100When the user wants to audit, review, or diagnose SEO issues on their site. Also use when the user mentions "SEO audit," "technical SEO," "why am I not ranking," "SEO issues," "on-page SEO," "meta tags review," or "SEO health check." For building pages at scale to target keywords, see programmatic-seo. For adding structured data, see schema-markup.
SKILLPASSING0 Findingsabout 2 months agoclawdefender
openclaw/skills
100Security scanner and input sanitizer for AI agents. Detects prompt injection, command injection, SSRF, credential exfiltration, and path traversal attacks. Use when (1) installing new skills from ClawHub, (2) processing external input like emails, calendar events, Trello cards, or API responses, (3) validating URLs before fetching, (4) running security audits on your workspace. Protects agents from malicious content in untrusted data sources.
SKILLPASSING0 Findingsabout 2 months agoaws-security-scanner
openclaw/skills
100Scan AWS accounts for security misconfigurations and vulnerabilities. Use when user asks to audit AWS security, check for misconfigurations, find exposed S3 buckets, review IAM policies, check security groups, audit CloudTrail, or run AWS security checks. Covers S3, IAM, EC2, RDS, CloudTrail, and common CIS benchmarks.
SKILLPASSING0 Findingsabout 2 months agoauth-implementation-patterns
wshobson/agents
100Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build secure, scalable access control systems. Use when implementing auth systems, securing APIs, or debugging security issues.
SKILLPASSING0 Findingsabout 2 months agoclawshell
openclaw/skills
100Human-in-the-loop security layer. Intercepts high-risk commands and requires push notification approval.
SKILLPASSING0 Findingsabout 2 months agoswitchboard-data-operator
openclaw/skills
100Autonomous operator for Switchboard on-demand feeds, Surge streaming, and randomness. Designs jobs, simulates via Crossbar, and deploys/updates/reads feeds across Solana/SVM, EVM, Sui, and other Switchboard-supported chains—with user-controlled security, spend limits, and allow/deny lists.
SKILLPASSING0 Findingsabout 2 months agok8s-manifest-generator
wshobson/agents
100Create production-ready Kubernetes manifests for Deployments, Services, ConfigMaps, and Secrets following best practices and security standards. Use when generating Kubernetes YAML manifests, creating K8s resources, or implementing production-grade Kubernetes configurations.
SKILLPASSING0 Findingsabout 2 months agokubernetes-specialist
Jeffallan/claude-skills
100Use when deploying or managing Kubernetes workloads requiring cluster configuration, security hardening, or troubleshooting. Invoke for Helm charts, RBAC policies, NetworkPolicies, storage configuration, performance optimization.
SKILLPASSING0 Findingsabout 2 months agoCORS
openclaw/skills
100Configure Cross-Origin Resource Sharing correctly to avoid security issues and debugging pain.
SKILLPASSING0 Findingsabout 2 months agok8s-security-policies
openclaw/skills
100Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or enforcing pod security standards.
SKILLPASSING0 Findingsabout 2 months ago