🚀 v1.5 is live — 8 panels, credential flow mapping, accept risk, and more. Read the changelog →

Scan your OpenClaw.
Fix it in one click.

Letter grade A+ through F. Auto-fix for common issues. Zero dependencies.
Nothing leaves your machine.

$ npm i -g openclaw-security-dashboard && openclaw-security-dashboard install

Or for a quick scan: npx openclaw-security-dashboard@latest

View on GitHub →
npm downloads npm version license

What You Get

A full security grade in your terminal

Now with 8 security panels in v1.5 — read the changelog.

Before hardening Grade F
F
0/100
9 findings: 2 critical · 3 high · 2 med · 2 low
Auto-Fix 4 Issues
CRITMalicious skill: solana-wallet-tracker
CRITClickFix pattern in sketch-helper
HIGHAPI key hardcoded in configAUTO-FIX
HIGHSandbox off · No safeBins
HIGHExecutable in skill directory
MEDExternal URLs in 2 skills
Gateway Skills Config Identity MCP
After hardening Grade A+
A+
100/100
0 findings · All 8 panels green
✓ Gateway locked to loopback + auth enabled
✓ All skills verified · IOC monitoring active
✓ L3 credential protection · Sandbox enabled
✓ Identity baseline verified · Weekly diff active
✓ MCP servers pinned · Policy enforced
✓ Incident response playbook in place
Gateway Skills Config Identity MCP

What It Checks

Eight security domains, one scan

🛡
Gateway Security

Validates bind address, authentication enforcement, TLS configuration, and port exposure to catch network-level misconfigurations.

📦
Skill Supply Chain

Scans for 102+ named IOCs, 21 pattern rules, C2 IP detection, and publisher blacklist matches across every installed skill.

🔒
Config Hardening

Checks file permissions, plaintext secrets in config, sandbox enforcement, and other security-critical runtime settings.

🧬
Identity Integrity

Detects SOUL.md tampering, scans for prompt injection patterns, and verifies hash baselines for identity files.

Persistence & Cron

Identifies rogue LaunchAgents, suspicious hooks, and checks MCP version pinning to prevent silent persistence.

📋
Session Analysis

Reviews session logs for injection attempts, credential leaks, and anomalous patterns that indicate compromise.

🔌
MCP Security

Audits MCP server configurations for unpinned versions, excessive server count, and unauthorized network access patterns.

📋
Built-in Audit

Runs openclaw security audit --deep and surfaces 78 config checks as the 8th panel. One command, full coverage.

Auto-Remediation

Scan it. Fix it. Verify it.

Most scanners stop at telling you what's wrong. This one fixes the mechanical issues for you — in the browser or from the command line.

F
Scan finds issues
Click “Auto-Fix”
C
Grade improves instantly
🌐
Gateway Rebind

Exposed gateway (0.0.0.0) rebound to localhost. Closes the most common attack vector.

🔒
File Permissions

Config files set to 600 (owner-only). Prevents skills from reading your secrets.

🚫
Auth Bypass

authBypass disabled. Ensures gateway authentication can't be skipped.

🛡
safeBins Allowlist

Restricts which system commands agents can execute. 11 safe defaults added.

🔑
API Key Cleanup

Plaintext keys replaced with env var references. Your secrets stay out of config files.

💾
Backup First

Timestamped backup created before every fix. Fully reversible. Nothing is ever deleted.

$ openclaw-security-dashboard --fix

Issues requiring human judgment — skill removal, identity files, network config — are left as findings with remediation guidance. That's where expert help comes in.

Set It & Forget It

Security that watches while you work

Two commands and your OpenClaw deployment is monitored 24/7. Starts on login, restarts on crash, re-scans every 30 minutes.

🔄
Auto Re-scan

Re-scans every 30 minutes. Catches new issues as your config changes. Configurable interval.

📊
Grade History

Every scan logged to grade-history.jsonl. Track your security posture over time.

🔌
Survives Reboot

macOS LaunchAgent or Linux systemd. Starts on login, restarts on crash. Zero maintenance.

🔔
Update Alerts

Status command checks for new versions. Stay current with the latest IOCs and security checks.

$ openclaw-security-dashboard status

Shows current grade, watch interval, next scan time, and available updates.

Why It's Different

Not another warning list

Built-in audits tell you "you have warnings." This scanner tells you what they mean, how critical they are, and what to do about each one.

Capability Built-in Audit openclaw-security-dashboard
Security grade (A+ to F)
Malicious skill IOC database ✓ 102+ IOCs
C2 IP / domain detection
SOUL.md integrity check
Prompt injection scanning
Session log analysis
Persistence / LaunchAgent detection
Actionable remediation steps Partial ✓ Per finding
One-click auto-fix ✓ 7 fix types
Always-on background monitoring ✓ Re-scans every 30m
Built-in audit integration ✓ Runs as 8th panel
Accept risk (false positives) ✓ Hash-pinned
SSRF detection ✓ Tiered severity
Credential flow mapping ✓ Per-key tracing
Capability drift detection ✓ Between scans
Tamper-evident audit trail ✓ SHA-256 chain
Network policy generation ✓ Auto UFW rules
100% local execution
Zero dependencies

What To Do With Your Grade

Your score. Your next step.

F–D

Critical exposures. Run --fix first to handle mechanical issues, then get expert help for the rest.

Auto-Fix + Expert Help
Get Expert Help →
C

Major gaps in supply chain or config. You're running default settings that attackers target first.

Hardening Report
Get a Report →
B

Good baseline, but missing hardened configs and IOC monitoring. Close the remaining gaps yourself.

Security Blueprint
Get the Blueprint →
A+

Fully hardened. Keep it that way — subscribe for IOC updates and new threat advisories.

Stay Protected
Free Checklist →

For Developers

Integration & automation

Technical details — JSON API, CI/CD, embed widget

Subcommands & Flags

openclaw-security-dashboard install          # install as background service
openclaw-security-dashboard status           # check grade + service state
openclaw-security-dashboard uninstall        # stop and remove service

openclaw-security-dashboard --fix            # scan + auto-fix + dashboard
openclaw-security-dashboard --watch          # re-scan every 30m (foreground)
openclaw-security-dashboard --watch-interval 15  # custom interval
openclaw-security-dashboard --json           # JSON output + exit
openclaw-security-dashboard --fix --json     # fix + JSON output

npx openclaw-security-dashboard@latest       # quick one-off scan via npx

JSON Output

Pass --json to get machine-readable output for dashboards and integrations:

npx openclaw-security-dashboard --json

Returns a structured report with overall grade, per-domain scores, findings array, and remediation steps:

{
  "grade": "C",
  "score": 58,
  "domains": {
    "gateway": { "score": 40, "findings": [...] },
    "supply_chain": { "score": 65, "findings": [...] },
    "config": { "score": 70, "findings": [...] },
    "identity": { "score": 45, "findings": [...] },
    "persistence": { "score": 80, "findings": [...] },
    "sessions": { "score": 50, "findings": [...] }
  },
  "timestamp": "2026-03-03T00:00:00Z"
}

CI/CD Integration

Add to your GitHub Actions workflow to fail builds below a threshold:

# .github/workflows/security.yml
name: Security Scan
on: [push, pull_request]
jobs:
  scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - run: npx openclaw-security-dashboard --json --min-grade B
        # Exits with code 1 if grade is below B

Embed Widget

Display your security grade on your project README or internal dashboard. The scanner generates a local SVG badge after each run:

npx openclaw-security-dashboard --badge ./security-badge.svg

Programmatic Usage

Import as a module for custom tooling:

import { scan } from 'openclaw-security-dashboard';

const report = await scan({ path: '/path/to/openclaw' });
console.log(report.grade); // "B"
console.log(report.findings.filter(f => f.severity === 'critical'));

Your agent is running.
Find out if it's safe. Fix what isn't.

Two commands. Always-on monitoring. Scan, auto-fix, and track your grade over time.

$ npm i -g openclaw-security-dashboard && openclaw-security-dashboard install