- Python 3.11+
- OpenClaw installed (
npm install -g openclaw) - pip (included with Python)
git clone https://github.com/yaseenkadlemakki/clawaudit.git
cd clawaudit
pip install -e .clawaudit quickstartThis single command will:
- Detect your Python version and platform
- Locate your OpenClaw installation
- Discover installed skills
- Validate or create the sentinel configuration
- Run a full security scan
- Display a results summary with next steps
If you prefer to run each step individually:
clawaudit doctorThis validates Python version, OpenClaw installation, config files, and service connectivity.
clawaudit scanRuns all 43 checks across 6 security domains. Add --format json --output report.json to export.
clawaudit findings
clawaudit findings --severity CRITICAL
clawaudit findings --format jsonclawaudit remediate # dry-run: list proposals
clawaudit remediate --apply # apply fixes (creates snapshots)clawaudit monitor # default 60s interval
clawaudit monitor --interval 30 # custom intervalclawaudit report -o report.md
clawaudit report --format json -o report.json| Command | Description |
|---|---|
clawaudit quickstart |
Full onboarding flow |
clawaudit version |
Show version, Python, platform, OpenClaw status |
clawaudit doctor |
Validate environment readiness |
clawaudit scan |
Run a full security scan |
clawaudit findings |
View findings from the last scan |
clawaudit monitor |
Start continuous monitoring daemon |
clawaudit audit |
Run audit (original command) |
clawaudit watch |
Start monitoring (original command) |
clawaudit skills |
List skills with trust scores |
clawaudit skills list |
List all registered skills |
clawaudit skills install |
Install a skill from file or URL |
clawaudit skills enable |
Enable a disabled skill |
clawaudit skills disable |
Disable a skill |
clawaudit skills uninstall |
Uninstall a skill (to trash) |
clawaudit skills recover |
Recover from trash |
clawaudit skills health |
Security analysis on a single skill |
clawaudit remediate |
Preview or apply remediations |
clawaudit report |
Generate compliance report |
clawaudit policies --list |
List loaded policy rules |
clawaudit alerts |
View recent alerts |
clawaudit baseline |
Manage config baselines |
clawaudit snapshots |
Manage remediation snapshots |
clawaudit config show |
Print effective configuration |
clawaudit config init |
Write default config file |
clawaudit hooks status |
Show plugin registration status |
Add ClawAudit to your CI pipeline to catch security issues before deployment:
# .github/workflows/security.yml
- name: Security Scan
run: |
pip install -e .
clawaudit scan --format json --output security-report.jsonThe scan command exits with code 1 when findings with FAIL results are detected, making it suitable for CI gates.
Use clawaudit monitor for continuous monitoring, or schedule periodic scans:
# crontab -e
0 */6 * * * cd /path/to/clawaudit && clawaudit scan --format json -o /var/log/clawaudit/scan-$(date +\%Y\%m\%d-\%H\%M).json# 1. Scan to identify issues
clawaudit scan
# 2. Review findings
clawaudit findings --severity CRITICAL
# 3. Preview proposed fixes
clawaudit remediate
# 4. Apply fixes with confirmation
clawaudit remediate --apply
# 5. Verify fixes
clawaudit scan
# 6. Rollback if needed
clawaudit snapshots list
clawaudit snapshots rollback <snapshot-name>