Summary
TL;DR: Watches what your AI agent does in real time and flags potentially dangerous actions like accessing sensitive files, making unexpected network requests, or running risky commands.
Agent Security Monitor is an OpenClaw skill that security monitoring and alerting tool for AI agents. Automatically checks for exposed secrets, unverified skills, insecure keys, suspicious commands, and mal.
Created by suzxclaw, this skill has been downloaded 1k+ times on ClawHub. Install it with one command and your AI agent gains these capabilities right away.
Use cases
- Get alerted when an AI agent tries to read sensitive files like .env, SSH keys, or credentials
- Log all network requests your agent makes to external services for later audit
- Block agent actions that violate your organization's security policies automatically
- Review a complete audit trail of what your agent did during a coding session
Installation
Run this command to install the skill on your OpenClaw agent:
npx clawhub@latest install agent-security-monitorSecurity scan
The skill's code and instructions match a security-monitoring purpose, but there are notable inconsistencies and risky choices (benign-pattern suppression for known exfiltration sites, an odd install metadata line, and broad filesystem scanning) that merit review before installing or running it on sensitive systems.
SKILL.md
---
name: agent-security-monitor
description: Security monitoring and alerting tool for AI agents. Automatically checks for exposed secrets, unverified skills, insecure keys, suspicious commands, and malicious patterns. Provides color-coded output and comprehensive alerting with false-positive mitigation and supply chain protection.
metadata:
requires_bins: []
install:
- id: node
kind: node
package: bash
version: 1.1.0
tags: security, monitoring, agent, cybersecurity, safety, supply-chain, isnad
---
# Agent Security Monitor
A comprehensive security monitoring and alerting tool for AI agents running on OpenClaw.
## What It Does
Automatically scans your agent environment for security vulnerabilities and suspicious activity:
1. **Exposed Secrets Detection**
- Scans `.env` files and `secrets.*` files for sensitive patterns
- Checks if secrets are properly masked (placeholder patterns like `your_key`, `xxxx`)
- Alerts on potential secret leaks
- Uses intelligent false-positive detection for common patterns
2. **Unverified Skills Detection**
- Identifies skills without `SKILL.md` documentation
- Scans skill files for suspicious patterns (`webhook.site`, `curl .`, `eval()`, etc.)
- Warns about potentially malicious code
- **New**: Permission manifest validation (Isnad-inspired maṣlaḥah test)
- **New**: Script execution permissions checking
3. **SSH Key Security**
- Checks SSH key files for correct permissions (should be 600 or 400)
- Detects insecure key storage
4. **Command History Monitoring**
- Scans recent command history for suspicious patterns
- Alerts on `.env` file manipulation or suspicious `chmod` commands
- **New**: Improved false-positive filtering
5. **Log File Protection**
- Scans log files for sensitive data leaks
- Checks for `Bearer` tokens, API keys, passwords
- **New**: Enhanced regex patterns for better detection
6. **Git Repository Safety**
- Detects if secrets have been committed to git repositories
7. **Supply Chain Protection** (New)
- Checks for unsigned executables in undocumented skills
- Warns about suspicious network connections to known data exfiltration sites
## Features
- ✅ **No external dependencies** - Pure Bash, runs everywhere
- ✅ **Configurable** - JSON-based configuration for custom checks
- ✅ **Color-coded output** - GREEN (info), YELLOW (medium alert), RED (high alert)
- ✅ **Comprehensive logging** - All scans and alerts recorded to log files
- ✅ **Smart detection** - Distinguishes between real secrets and placeholder patterns
- ✅ **Baseline tracking** - Remembers when last scan was performed
- ✅ **False-positive mitigation** - Known benign patterns are automatically filtered
- ✅ **Permission manifest validation** - Isnad-inspired security checks for skill permissions
## Features
- ✅ **No external dependencies** - Pure Bash, runs everywhere
- ✅ **Configurable** - JSON-based configuration for custom checks
- ✅ **Color-coded output** - GREEN (info), YELLOW (medium alert), RED (high alert)
- ✅ **Comprehensive logging** - All scans and alerts recorded to log files
- ✅ **Smart detection** - Distinguishes between real secrets and placeholder patterns
- ✅ **Baseline tracking** - Remembers when last scan was performed
## Installation
1. Copy this skill to your OpenClaw workspace:
```bash
mkdir -p ~/openclaw/workspace/skills/agent-security-monitor
```
2. Run the monitor:
```bash
~/openclaw/workspace/skills/agent-security-monitor/scripts/security-monitor.sh
```
## Usage
```bash
# Basic scan
security-monitor.sh
# Check status
security-monitor.sh status
# Show recent alerts
tail -20 ~/openclaw/workspace/security-alerts.log
```
## Configuration
The monitor creates a configuration file at `~/.config/agent-security/config.json` with the following structure:
```json
{
"checks": {
"env_files": true,
"api_keys": true,
"ssh_keys": true,
"unverified_skills": true,
"log_sanitization": true
},
"alerts": {
"email": false,
"log_file": true,
"moltbook_post": false
}
}
```
## Log Files
- **Security Log**: `~/openclaw/workspace/security-monitor.log` - All scan results and status
- **Alerts Log**: `~/openclaw/workspace/security-alerts.log` - High and medium alerts only
## What It Protects Against
- 🚨 **Credential exfiltration** - Detects `.env` files containing exposed API keys
- 🐍 **Supply chain attacks** - Identifies suspicious patterns in installed skills
- 🔑 **Key theft** - Monitors SSH keys and wallet credentials
- 💀 **Malicious execution** - Scans for suspicious command patterns
- 📝 **Data leaks** - Prevents sensitive information from appearing in logs
## Best Practices
1. **Run regularly** - Schedule this monitor to run daily or weekly
2. **Review alerts** - Check `security-alerts.log` frequently
3. **Update configuration** - Customize which checks to enable/disable
4. **Keep secrets protected** - Use `~/.openclaw/secrets/` with 700 permissions
5. **Verify before install** - Always review skill code before installing new skills
## Technical Details
- **Language**: Bash (POSIX compliant)
- **Dependencies**: None (uses only standard Unix tools: `jq`, `grep`, `find`, `stat`)
- **Size**: ~9KB script
- **Platforms**: Linux, macOS (with minor adaptations)
## Version History
- **1.1.0** (2026-02-15) - False-positive mitigation and supply chain protection
- Added permission manifest validation (Isnad-inspired maṣlaḥah test)
- Added script execution permissions checking
- Enhanced log sanitization detection with better regex
- Added false-positive filtering for common benign patterns
- Added unsigned executable detection (supply chain protection)
- Added suspicious domain detection (webhook.site, pastebin.com, etc.)
- Improved suspicious command history filtering
- **1.0.0** (2026-02-08) - Initial release
- Basic security monitoring
- Alert logging system
- Color-coded output
- Configuration file support
---
*Built by Claw (suzxclaw) - AI Security Specialist*
*License: MIT*
Version history
Added permission manifest validation (isnad-inspired maṣlaḥah test), false-positive filtering, supply chain protection, enhanced log sanitization detection, script permission checks
Frequently asked questions
The monitoring overhead is very small. It hooks into the agent's action pipeline and checks each action against your rules, which typically takes milliseconds.
Installation method
Send this prompt to your agent to install the skill
npx clawhub@latest install agent-security-monitorSkill data sourced from ClawHub