From sundial-org-awesome-openclaw-skills-4
Audits and hardens Clawdbot/Moltbot installations: detects exposed gateways, fixes permissions, enables authentication, checks Node.js/mDNS, guides firewall/Tailscale setup. Use post-install on servers/VPS.
npx claudepluginhub joshuarweaver/cascade-ai-ml-agents-misc-2 --plugin sundial-org-awesome-openclaw-skills-4This skill uses the workspace's default tool permissions.
Comprehensive security scanner and hardening guide for Clawdbot/Moltbot installations.
Guides Next.js Cache Components and Partial Prerendering (PPR) with cacheComponents enabled. Implements 'use cache', cacheLife(), cacheTag(), revalidateTag(), static/dynamic optimization, and cache debugging.
Guides building MCP servers enabling LLMs to interact with external services via tools. Covers best practices, TypeScript/Node (MCP SDK), Python (FastMCP).
Generates original PNG/PDF visual art via design philosophy manifestos for posters, graphics, and static designs on user request.
Comprehensive security scanner and hardening guide for Clawdbot/Moltbot installations.
Why this matters: 1,673+ Clawdbot gateways were found exposed on Shodan. If you installed Clawdbot on a server or VPS, you might be one of them.
# Scan for issues
npx clawdbot-security-audit
# Scan and auto-fix
npx clawdbot-security-audit --fix
# Deep scan (includes network check)
npx clawdbot-security-audit --deep --fix
bind: "loopback" (127.0.0.1)bind: "lan" or bind: "0.0.0.0"// ~/.clawdbot/clawdbot.json
{
"gateway": {
"bind": "loopback",
"port": 18789
}
}
chmod 700 ~/.clawdbot
chmod 600 ~/.clawdbot/clawdbot.json
chmod 700 ~/.clawdbot/credentials
{
"gateway": {
"auth": {
"mode": "token"
}
}
}
Then set the token:
export CLAWDBOT_GATEWAY_TOKEN=$(openssl rand -hex 32)
export CLAWDBOT_DISABLE_BONJOUR=1
# Default deny incoming
sudo ufw default deny incoming
sudo ufw default allow outgoing
# Allow SSH (don't lock yourself out!)
sudo ufw allow ssh
# Allow Tailscale if using
sudo ufw allow in on tailscale0
# Enable firewall
sudo ufw enable
# DO NOT allow port 18789 publicly!
# Install
curl -fsSL https://tailscale.com/install.sh | sh
sudo tailscale up
# Configure Clawdbot
# Add to clawdbot.json:
{
"gateway": {
"bind": "loopback",
"tailscale": {
"mode": "serve"
}
}
}
When a Clawdbot gateway is exposed:
Prompt injection attacks can extract this data with a single email or message.
# npm
npm install -g clawdbot-security-audit
# ClawdHub
clawdhub install lxgicstudios/clawdbot-security
Built by LXGIC Studios - @lxgicstudios