🛠️ Runtime Sentinel
OpenClawエージェントの実行時セキュリティを多角的に監視し、脅威から保護するSkill。
📜 元の英語説明(参考)
Runtime security guardian for OpenClaw agents. Use this skill whenever the user mentions security, skill safety, prompt injection, malware, suspicious behavior, credential leaks, network monitoring, skill integrity, or the ClawHavoc attack. Also trigger for phrases like "is this skill safe", "audit my skills", "check for threats", "my agent is acting weird", "scan for malware", "protect my agent", or any concern about what installed skills are doing at runtime. runtime-sentinel provides five active defenses: skill integrity hashing, prompt injection detection, credential exposure auditing, network egress monitoring, and process anomaly detection. Free tier covers hashing and basic injection scanning. Premium features (continuous daemon, egress monitoring, process anomaly detection) are gated via x402 USDC micropayments on Base — no account or API key required.
🇯🇵 日本人クリエイター向け解説
OpenClawエージェントの実行時セキュリティを多角的に監視し、脅威から保護するSkill。
※ jpskill.com 編集部が日本のビジネス現場向けに補足した解説です。Skill本体の挙動とは独立した参考情報です。
⚠️ ダウンロード・利用は自己責任でお願いします。当サイトは内容・動作・安全性について責任を負いません。
🎯 このSkillでできること
下記の説明文を読むと、このSkillがあなたに何をしてくれるかが分かります。Claudeにこの分野の依頼をすると、自動で発動します。
📦 インストール方法 (3ステップ)
- 1. 上の「ダウンロード」ボタンを押して .skill ファイルを取得
- 2. ファイル名の拡張子を .skill から .zip に変えて展開(macは自動展開可)
- 3. 展開してできたフォルダを、ホームフォルダの
.claude/skills/に置く- · macOS / Linux:
~/.claude/skills/ - · Windows:
%USERPROFILE%\.claude\skills\
- · macOS / Linux:
Claude Code を再起動すれば完了。「このSkillを使って…」と話しかけなくても、関連する依頼で自動的に呼び出されます。
詳しい使い方ガイドを見る →- 最終更新
- 2026-05-17
- 取得日時
- 2026-05-17
- 同梱ファイル
- 17
💬 こう話しかけるだけ — サンプルプロンプト
- › Runtime Sentinel を使って、最小構成のサンプルコードを示して
- › Runtime Sentinel の主な使い方と注意点を教えて
- › Runtime Sentinel を既存プロジェクトに組み込む方法を教えて
これをClaude Code に貼るだけで、このSkillが自動発動します。
📖 Claude が読む原文 SKILL.md(中身を展開)
この本文は AI(Claude)が読むための原文(英語または中国語)です。日本語訳は順次追加中。
runtime-sentinel
A runtime security skill for OpenClaw. Defends against the threat landscape exposed by ClawHavoc: backdoored skills, prompt injection via external data, credential exfiltration, and process-level abuse.
Free tier: skill integrity checks, basic injection scanning.
Premium (x402/USDC/Base): continuous daemon monitoring, network egress
monitoring, process anomaly detection, full audit log.
Quick start
# One-shot audit of all installed skills (free)
sentinel audit
# Continuous guardian daemon (premium — will prompt for x402 payment)
sentinel daemon start
# Scan a single skill before installing
sentinel check <skill-path-or-clawhub-id>
What runtime-sentinel defends against
See references/threat-model.md for the full threat matrix. In brief:
| Threat | Feature | Tier |
|---|---|---|
| Tampered skill files post-install | Integrity hashing | Free |
| Prompt injection via email/web/skill output | Injection scanner | Free |
| Plaintext secrets in skill dirs / SOUL.md | Credential auditor | Free |
| Unexpected outbound connections | Egress monitor | Premium |
| Shell commands outside declared behavior | Process anomaly | Premium |
| Continuous real-time protection | Daemon mode | Premium |
Workflow
1 — First-time setup
# Install the binary (built from scripts/src/)
cargo install --path scripts/ --bin sentinel
# Verify installation and print wallet address
sentinel setup
sentinel setup will:
- Generate or import a Base wallet (BIP-39, stored in
~/.sentinel/wallet) - Print the wallet address so the user can fund it with USDC for premium
- Run a free baseline audit and print results
2 — On-demand audit (free)
When the user says anything like "scan my skills", "audit", "check for threats":
sentinel audit [--path ~/.openclaw/skills]
Output: a structured report of hash mismatches, injection patterns, and exposed credentials. No payment required.
3 — Single skill check before install (free)
When the user wants to vet a skill before running clawhub install:
sentinel check <skill-directory-or-clawhub-id>
Prints a risk score (LOW / MEDIUM / HIGH / CRITICAL) with findings.
4 — Premium features via x402
When the user asks for daemon mode, egress monitoring, or process anomaly
detection, sentinel will automatically:
- Hit the sentinel API endpoint
- Receive a
402 Payment Requiredwith price in theX-Payment-Requestheader (typically $0.01–$0.05/day for daemon mode) - Sign the USDC transfer from
~/.sentinel/wallet - Retry the request — access granted for the paid period
The user will see the price before their wallet signs anything. All
non-custodial. See references/x402-payment.md for the full payment flow.
5 — Daemon mode (premium)
sentinel daemon start # runs in foreground, writes to ~/.sentinel/daemon.log
# Run in background from your shell if needed:
# sentinel daemon start > ~/.sentinel/daemon.log 2>&1 &
# disown
sentinel daemon status
sentinel daemon stop
sentinel daemon logs # tail the audit log
The daemon watches:
~/.openclaw/skills/**for file mutations (inotify / FSEvents)~/.openclaw/SOUL.mdandMEMORY.mdfor unauthorized writes- Network connections made by skill subprocesses
- Child process trees for undeclared shell commands
Alerts are delivered via OpenClaw's notification system and written to the audit log.
Interpreting results
Risk levels
- LOW: No findings, or informational only (e.g. skill requests network but declares it)
- MEDIUM: Undeclared permission, suspicious pattern, or stale hash
- HIGH: Known malicious pattern, credential exposure, or undeclared egress
- CRITICAL: Active exfiltration attempt, reverse shell indicator, or SOUL.md mutation
What to do on HIGH / CRITICAL
sentinel isolate <skill-name>— quarantines the skill (moves it out of the active skills directory)- Review the finding in
~/.sentinel/audit.log - Check the skill's ClawHub VirusTotal report
- If confirmed malicious,
clawhub uninstall <skill>and report viasentinel report <skill-name>
Reference files
Read these when you need deeper detail:
references/threat-model.md— Full threat matrix and attack descriptions from ClawHavoc and similar campaignsreferences/x402-payment.md— x402 payment flow, wallet setup, and troubleshootingreferences/binary-build.md— How to buildsentinelfrom source, cross- compilation targets, CI/CD
Wallet setup for premium features
sentinel wallet show # print address and USDC balance
sentinel wallet fund # print QR code and address to send USDC
sentinel wallet export # export mnemonic for backup (handle carefully)
sentinel wallet recover # restore from mnemonic on a new machine
Minimum recommended balance for uninterrupted daemon mode: $1 USDC (roughly 20–100 days of coverage depending on scan frequency).
Privacy
sentinel is fully local. No skill content, file paths, or scan results are
sent to any server. The only outbound calls are:
- x402 payment verification to the Base facilitator (amount + wallet address only)
- Optional: VirusTotal hash lookups (hash only, no file content)
Both can be disabled with --offline for air-gapped environments (free tier
only in offline mode).
同梱ファイル
※ ZIPに含まれるファイル一覧。`SKILL.md` 本体に加え、参考資料・サンプル・スクリプトが入っている場合があります。
- 📄 SKILL.md (6,786 bytes)
- 📎 LICENSE.md (1,086 bytes)
- 📎 README.md (4,230 bytes)
- 📎 references/binary-build.md (4,603 bytes)
- 📎 references/threat-model.md (5,009 bytes)
- 📎 references/x402-payment.md (3,363 bytes)
- 📎 scripts/Cargo.toml (1,933 bytes)
- 📎 scripts/rust-toolchain.toml (200 bytes)
- 📎 scripts/src/audit.rs (17,733 bytes)
- 📎 scripts/src/daemon.rs (12,455 bytes)
- 📎 scripts/src/egress.rs (10,234 bytes)
- 📎 scripts/src/injection.rs (4,693 bytes)
- 📎 scripts/src/main.rs (4,757 bytes)
- 📎 scripts/src/patterns/mod.rs (4,043 bytes)
- 📎 scripts/src/payment.rs (26,086 bytes)
- 📎 scripts/src/process.rs (10,690 bytes)
- 📎 scripts/src/report.rs (3,107 bytes)