Configure Cross-Origin Resource Sharing correctly to avoid security issues and debugging pain.
Manage and secure local high-privilege storage serving workflows. Use when creating, starting, stopping, or hardening a full-drive file server and related op...
Google Workspace CLI for Gmail, Calendar, and Auth (restricted via security wrapper).
Security scanner that catches malicious skills before they steal your data. Detects credential theft, prompt injection, and hidden backdoors. Works immediately with zero setup. Optional AST dataflow a
Soft blocklist guard for OpenClaw. Injects a security directive at agent bootstrap and warns on incoming messages referencing blocked terms. Blocks clawhub/c...
Securely migrate OpenClaw Agent (config, memory, skills) to a new machine.
Security audit agent for GEP/EvoMap ecosystem. Scans Gene/Capsule assets using immune-system-inspired 3-layer detection: L1 pattern scan, L2 intent inference...
Connect your OpenClaw agent to A2A4B2B for agent discovery, secure sessions, RFP-based negotiation, and collaborative B2B task management.
Runtime security monitor for OpenClaw skills. Watches what your installed skills actually DO — network calls, file access, credential reads, process activity. Not a scanner. A watchdog.
Transform an Android phone with IP Webcam into an intelligent Edge AI security system with OpenClaw.
Deploy, secure, and operate MinIO object storage using mc workflows, policy controls, replication, and incident-safe runbooks.
Build secure authentication with sessions, JWT, OAuth, passwordless, MFA, and SSO for web and mobile apps.
macOS security monitoring for OpenClaw
The only agent framework that improves itself while you sleep. Self-improving AI infrastructure with 17 dharmic security gates, 4-tier resilience, and 250k+ tokens of 2026 research.
Generates production-ready Python Solana trading bots using Jupiter v6 API and DexScreener data with priority fees and secure key management.
Control and automate Tuya Smart devices with official cloud APIs, secure request signing, region-aware routing, and safe command execution.
Run a two-pass, multidisciplinary code audit led by a tie-breaker lead, combining security, performance, UX, DX, and edge-case analysis into one prioritized report with concrete fixes. Use when the us
Securely synchronize and transfer resources between verified autonomous agents using cryptographically tethered identities and replay-protected requests.
Security scanner for Moltbot skills. Scan GitHub repositories for vulnerabilities before installation.
Create and manage MPC blockchain wallets and sign transactions on EVM and Solana chains using Para's secure distributed key infrastructure via REST API.
Security auditor for ClawHub skills. Run before installing ANY skill — scans SKILL.md and scripts for prompt injection, data exfiltration, shell injection, p...
Provides best practices and methodologies for structuring, optimizing, securing, and scaling production Django applications, including architecture, ORM usag...
Securely transfer USD1 (USDC on Wormhole) between wallets using Wormhole Liquidity Facility on Testnet by default.
Gmail security proxy with policy enforcement, approval workflows, and audit logging. Use when the user wants to read, search, or send Gmail with guardrails —...