Skills openclaw-guard-skill
Local VAIBot Guard skill for OpenClaw. Use to run the guard service, enforce tool decisions via the OpenClaw circuit-breaker plugin, manage approvals, and validate guard receipts/audit logs. Also use when installing/operating the guard systemd user service or running guard unit tests.
install
source · Clone the upstream repo
git clone https://github.com/openclaw/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/openclaw/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/briantanthony/vaibot-guard" ~/.claude/skills/clawdbot-skills-openclaw-guard-skill && rm -rf "$T"
manifest:
skills/briantanthony/vaibot-guard/SKILL.mdsource content
OpenClaw Guard Skill (VAIBot v2.1)
Provide a local policy decision service plus a CLI to gate OpenClaw tool calls and write tamper-evident audit logs in
.vaibot-guard/.
Sensitive credentials
— bearer token for Guard endpoints (recommended)VAIBOT_GUARD_TOKEN
— optional: anchor receipts to VAIBotVAIBOT_API_KEY/prove
Treat these as secrets.
HTTP API (guard service)
GET /health
+POST /v1/decide/exec
(shell exec flows)POST /v1/finalize
+POST /v1/decide/tool
(OpenClaw tool gating)POST /v1/finalize/tool
+POST /v1/approvals/list
(approve/deny)POST /v1/approvals/resolve
(checkpoint flush)POST /v1/flush
(Merkle inclusion proofs)POST /api/proof
Auth:
- If
is set, requireVAIBOT_GUARD_TOKEN
on protected endpoints.Authorization: Bearer <token>
Manual quick start (no persistence)
Run the service in the foreground:
export VAIBOT_GUARD_HOST=127.0.0.1 export VAIBOT_GUARD_PORT=39111 export VAIBOT_POLICY_PATH=references/policy.default.json export VAIBOT_WORKSPACE="$(pwd)" export VAIBOT_GUARD_LOG_DIR="$VAIBOT_WORKSPACE/.vaibot-guard" export VAIBOT_GUARD_TOKEN="<random-token>" node scripts/vaibot-guard-service.mjs
Smoke test:
curl -s http://127.0.0.1:39111/health
OpenClaw enforcement (recommended)
Use the OpenClaw circuit-breaker plugin so tool calls are intercepted at the gateway (not just “model follows instructions”).
Reference:
references/openclaw-bridge.md
Optional: systemd user service
Install a user service + env file via the CLI helper:
node scripts/vaibot-guard.mjs install-local
This writes:
~/.config/systemd/user/vaibot-guard.service~/.config/vaibot-guard/vaibot-guard.env
Templates live under
references/systemd/ for reference.
Policy + schemas
See:
references/policy.mdreferences/policy.default.jsonreferences/receipt-schema.mdreferences/checkpoint-schema.mdreferences/inclusion-proofs.mdreferences/required-mode.md
Tests
Run guard service tests (no external deps):
node --test tests/guard-service.test.mjs