Search the skill radar
Search by skill, publisher, category, or trust summary — then use the runtime filters to find cards with live test evidence. The two main lanes are baseline safety checks first and deeper follow-on functionality checks after that.
✨ Quick picks
🏷 Categories
🧾 Evidence level: source-scanned means local source evidence; catalog-only means thinner metadata-first coverage.
🧪 Runtime status: cards can show only the baseline safety lane or the deeper follow-on functionality lane, depending on how far the skill got.
📏 Depth cue: tells you whether the evidence stops at baseline checks, includes follow-on functionality checks, or includes richer fixture/example proof.
⏱ Freshness cue: tells you whether the latest runtime evidence is from the last 24 hours, the last 7 days, or is older and therefore less current.
🩺 Failure confidence: distinguishes a first seen failure from a repeated failure or a regression after an earlier pass, so not every red row means the same thing.
Results
smart-contract-audit
Audit and analyze Solidity smart contracts for security vulnerabilities.
+ 1 more
skill-vettr
Static analysis security scanner for third-party OpenClaw skills.
+ 1 more
skill-trust-auditor
Audit a ClawHub skill for security risks BEFORE installation.
+ 1 more
1sec-security
Install, configure, and manage 1-SEC — an open-source, all-in-one
+ 1 more
safe-backup
Backup OpenClaw state directory and workspace with security best practices.
+ 2 more
bunni-modes
A persona and model-switching toolkit featuring Bunni, your bubbly cyber-security assistant.
+ 1 more
firebase-auth-setup
Configures Firebase Authentication — providers, security rules, custom claims, and React auth hooks
+ 2 more
git-sentinel
This skill allows the agent to act as a **Senior Software Engineer & Security Auditor**.
+ 1 more
tech-security-audit
This skill integrates Nmap scanning functionality to perform local network vulnerability assessments.
+ 1 more
simple-redux
Formats text according to specified style guidelines. A clean example skill with no security issues.
+ 1 more
efka-api-integration
Greek social security (EFKA) integration — employee records, contribution calculations, APD declarations. Human approval for submissions.
+ 2 more
cybercentry-solidity-code-verification
Cybercentry Solidity Code Verification on ACP - Fast, automated security analysis of Solidity smart contract code.
+ 1 more
skillsentry
OpenClaw security audit + prompt injection detector. Scans gateway/vulns/cron/PI patterns. Use for frenzy-proofing installs.
+ 1 more
ntopng-admin
Professional network monitoring and device identification using ntopng Redis data. Designed for security auditing and diagnostic environments.
+ 1 more
dependency-audit
Smart dependency health check — security audit, outdated detection, unused deps, and prioritized update plan
+ 1 more
cybercentry-web-application-verification
Cybercentry Web Application Verification on ACP - OWASP-powered security scans for websites, dApp frontends.
+ 1 more
enoch-tuning
A battle-tested OpenClaw setup with pre-wired identity, memory architecture, security protocols, and automation.
+ 1 more
skill-update-delta-monitor
Helps detect security-relevant changes in AI skills after installation.
+ 1 more
benlee-skillguard
Security scanner that audits OpenClaw skills for malicious code, prompt injection, supply chain attacks, data exfiltration, and more
+ 2 more
ztp
A mandatory security audit skill for validating new code, skills, and MCP servers against the SEP-2026 Zero Trust protocol.
+ 1 more
hostinger-vps-optimizer
Apply battle-tested optimizations for KVM/Cloud VPS: kernel tuning, caching, security hardening, auto-scaling.
+ 1 more
subagent-architecture
Advanced patterns for specialized subagent orchestration with production-ready reference implementations. Security isolation, phased implementation, peer collaboration, and cost-aware spawning.
+ 1 more
openapi-deep-audit
You are a senior backend architect, API security auditor, and test strategy designer.
+ 1 more
cloudflare-guard
Configures and manages Cloudflare DNS, caching, security rules, rate limiting, and Workers