AI Agent Skill Security Scanner - Detect malicious skills, verify signatures, analyze permissions, and provide trust ratings for the agent ecosystem. Protect...
Create and manage ERC-4337 smart accounts, policies, permissions, and enforcement for AI agents with on-chain spending guardrails.
--- name: currency-converter description: 提供实时或近实时的货币汇率查询与转换服务。 version: 1.1.0 author: AI Assistant Team permissions: 需要网络访问权限(用于
Runs a backend-backed live safety check for instructions that may trigger tool execution, external calls, file edits, permission changes, destructive or irre...
Build secure access control with RBAC, ABAC, permissions, policies, and scope-based authorization.
Secure environment variable & secret management with AES-256 encryption, auto-redaction, permission control, prevent credential leakage
Manage Feishu group chats by updating names, descriptions, permissions, and toggling busy status indicators.
Security scanner for OpenClaw skills. Scans skills for malware, credential theft, data exfiltration, prompt injection, and permission overreach before instal...
Comprehensive security audit for OpenClaw deployments. Checks Docker port bindings, SSH config, openclaw.json settings, file permissions, exposed services, a...
Create and manage fungible tokens and NFTs on Hedera with minting, supply control, and permission configuration.
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
--- name: booking-hotel-search version: 1.0.0 description: Search Booking.com for real-time hotel availability, prices, and room details author: mtnrabi permissions: - network:outbound triggers: -
Harden an OpenClaw Linux server with SSH key-only auth, UFW firewall, fail2ban brute-force protection, and credential permissions. Use when setting up a new...
Build a high-performance file system indexer and search tool in Go. Implement recursive directory traversal with configurable depth. Add file metadata extraction including size, dates, and permissions
Share memories and state with other users. Use when user wants to share knowledge, create users/groups, grant permissions, set up family or team sharing, subscribe to memory changes, or manage access
Full-featured Apache Superset MCP server with 135+ tools for dashboards, charts, datasets, SQL Lab, security (users, roles, RLS, groups), permissions audit, and 30+ built-in safety validations. Suppor
An MCP server based on dAWShund to enumerate AWS IAM data, analyze effective permissions, and visualize access relationships across users, roles, and resources. Built for cloud security engineers who
Operate Linux systems avoiding permission traps, silent failures, and common admin mistakes.
Diagnoses common Linux service issues using logs, systemd/PM2, file permissions, Nginx reverse proxy checks, and DNS sanity checks. Use when a server app is failing, unreachable, or misconfigured.
Scan token contracts for honeypot, rug pull, permission risks, tax fees, blacklist, and provide a detailed risk assessment report.
Supports SSE, STDIO; not only limited to MySQL's CRUD functionality; also includes database exception analysis capabilities; controls database permissions based on roles; and makes it easy for develop
Build and deploy safety-profiled gogcli binaries with compile-time command removal. Use when setting up gog for an AI agent with restricted permissions — cho...