Host security hardening and risk-tolerance configuration for OpenClaw deployments. Use when a user asks for security audits, firewall/SSH/update hardening, risk posture, exposure review, OpenClaw cron scheduling for periodic checks, or version status checks on a machine running OpenClaw (laptop, workstation, Pi, VPS).
91
88%
Does it follow best practices?
Impact
95%
2.11xAverage score across 3 eval scenarios
Advisory
Suggest reviewing before use
Remediation plan completeness and OpenClaw command accuracy
Deep audit command
0%
100%
Update status check
0%
80%
Numbered choices
20%
100%
OpenClaw scope accuracy
100%
100%
Fix flag scoping
0%
100%
Fix as numbered option
0%
50%
Rollback and access preservation
90%
100%
Exact remediation commands
100%
100%
Least-privilege notes
90%
100%
Execution options section
20%
100%
Cron scheduling idempotency and correct job naming
List before create
33%
100%
Edit if exists
0%
100%
Add if not exists
0%
100%
Exact audit job name
0%
100%
Exact update job name
0%
100%
Valid OpenClaw commands
20%
90%
Healthcheck reminder note
23%
100%
Explicit approval acknowledgment
0%
25%
Audit trail logging and memory file format compliance
Correct memory file path
0%
100%
Append-only structure
83%
100%
Sensitive detail redaction
100%
100%
What was checked
100%
100%
Key findings recorded
100%
100%
Actions and commands recorded
100%
100%
Cron jobs and decisions
100%
100%
Audit log plan ID and timestamp
100%
88%
No tokens or credentials in files
100%
100%
Audit log approved steps
100%
100%
4467e04
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.