🎁 Get the FREE AI Skills Starter Guide β€” Subscribe β†’
BytesAgainBytesAgain
πŸ¦€ ClawHub

portable-deployment-audit

by @otweihan

Read-only security auditing for OpenClaw deployments, repositories, and local project directories. Scan an explicit target directory for exposed credentials,...

πŸ“‹ Tips & Best Practices

  • --fix is intentionally disabled in this version.
  • Findings are advisory and should be reviewed before making changes.
  • Text output includes short remediation recommendations derived from the findings.
  • The script performs file inspection only; no shell commands or external binaries are executed.
  • For automation, prefer --format json and parse the structured report.
  • πŸ”’ Constraints

  • Treat this skill as read-only.
  • Do not use it to modify files automatically.
  • Pass --target when auditing something other than the current directory.
  • Use --format json for machine-readable output; stdout will contain pure JSON only.
  • Use --strict when you want a non-zero exit on HIGH findings in CI.
  • Use --exclude-dir to skip bulky or irrelevant directories in mixed repos.
  • Use --allow-port to suppress expected configured/published ports in local or staged environments.
  • This version uses file inspection only and does not invoke external binaries such as git, ss, or netstat.
  • Expect limited permission analysis on Windows; Unix mode-bit checks only run on Unix-like systems.
  • View on ClawHub
    TERMINAL
    clawhub install portable-deployment-audit

    πŸ§ͺ Use this skill with your agent

    Most visitors already have an agent. Pick your environment, install or copy the workflow, then run the smoke-test prompt above.

    πŸ” Can't find the right skill?

    Search 60,000+ AI agent skills β€” free, no login needed.

    Search Skills β†’