Built-in Skill Security Scanner
Integrated a skill security scanner directly into OpenClaw’s skill lifecycle. Runs automatically when skills are installed or updated, blocking malicious patterns before execution.
Open Source
We build security tools for the AI agent ecosystem and contribute them upstream. 7 PRs merged into OpenClaw (205K+ stars), 8 open-source tools published, 2,500+ lines of security code merged into projects used by millions.
Open-source security packages for the AI agent ecosystem.
Security scanner, red team toolkit, runtime protection, and benchmarks for AI agents. 204 security checks, 115 attack payloads, auto-fix, ARP monitoring, and OASB compliance scoring.
Keeps secrets out of AI context windows. PreToolUse hooks block credential access across Claude Code, Cursor, Copilot, and Windsurf.
Lightweight agent identity library. Ed25519 identity, local audit log, capability policy, and trust scoring. No server required.
Unified entry point for the OpenA2A security platform. Routes to HackMyAgent, Secretless, AIM, and all other tools through adapters.
Security vulnerabilities we found, reported, and fixed in major open-source projects. All 7 PRs accepted by OpenClaw maintainers — 5 merged directly, 2 adopted into shared upstream modules.
Integrated a skill security scanner directly into OpenClaw’s skill lifecycle. Runs automatically when skills are installed or updated, blocking malicious patterns before execution.
The config.get WebSocket method was returning all channel credentials in plaintext to any connected client. Built a redaction layer that masks sensitive fields across all supported channels.
The A2UI file serving endpoint used a two-step lstat + realpath check vulnerable to time-of-check/time-of-use (TOCTOU) race conditions. An attacker could swap a symlink between the check and the read to traverse outside the served directory. Replaced with atomic openFileWithinRoot.
The WhatsApp channel adapter was writing creds.json with default 0644 permissions, making credentials readable by any user on the system. Added chmodSync 0o600 to all 3 write paths to restrict access to the file owner only.
Hook token authentication used standard string comparison (===), which leaks token length and character values through timing differences. Proposed replacing with crypto.timingSafeEqual. The maintainers adopted the fix into a shared safeEqualSecret utility applied across all authentication paths.
Plugin and hook installation ran npm install without the --ignore-scripts flag, allowing malicious packages to execute arbitrary code during install via preinstall/postinstall lifecycle scripts. The maintainers adopted this fix into a shared installPackageDir utility, ensuring all npm install invocations now use --ignore-scripts by default.
First automated scanner to detect CVE-2026-25253 (CVSS 8.8), the OpenClaw WebSocket hijacking vulnerability exploited in the ClawHavoc campaign. Added 13 new checks bringing the total to 187.