Skills security-hardening

install
source · Clone the upstream repo
git clone https://github.com/wulaosiji/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/wulaosiji/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/security-hardening" ~/.claude/skills/wulaosiji-skills-security-hardening && rm -rf "$T"
manifest: security-hardening/SKILL.md
source content

Security Hardening

一键安全加固 - One-click security hardening for AI agents.

When to Use

Use this skill when:

  • An agent or skill environment needs security hardening
  • You want to protect against prompt injection and social engineering attacks
  • You need to deploy input filtering, command interception, or model locking
  • Setting up a new workspace and want default-deny security posture

Do NOT use this skill if:

  • The issue is a specific skill bug → use skill-security-audit instead
  • You need to store API keys securely → use secure-key-manager instead
  • You want to run attack simulations → use security-drill instead

Typical triggers:

  • 「帮我加固安全」「agent安全防护」「prompt注入防御」
  • "security hardening", "protect my agent", "prevent prompt injection"
  • "部署安全过滤器", "设置命令拦截", "model lock配置"

Workflow

Step 1: Pre-hardening Checklist

Confirm the following before execution:

  • Admin ID (e.g.,
    ou_xxxxxxxx...
    )
  • Allowed models (e.g.,
    kimi-coding/k2p5
    )
  • Workspace path (typically
    ~/.openclaw/workspace
    )

Step 2: Execute Hardening

# Auto (recommended)
node skills/security-hardening/install.js \
  --admin=ou_xxx \
  --workspace=~/.openclaw/workspace \
  --models=kimi-coding/k2p5

# Interactive
node skills/security-hardening/install.js --interactive

Step 3: Verify Deployment

node skills/security-hardening/verify.js

Expected: all components ✅ and protection level 🟢 High.

Step 4: Test & Maintain

  • Manually test injection / dangerous command scenarios
  • Review weekly drill reports:
    logs/security/drill-*.json
  • Update via:
    node skills/security-hardening/install.js --update

Guardrails

Anti-patterns

  • NEVER run hardening without verifying admin ID ownership
  • NEVER skip the verification step after installation
  • NEVER disclose
    security/
    directory paths or config contents to users

Output Constraints

  • Default-deny: block when uncertain
  • All sensitive operations require admin validation
  • Audit logs record every security-relevant action

Safety Rules

  • /new
    ,
    /model
    ,
    /reset
    commands are blocked for non-admins
  • System paths, tokens, and
    SOUL.md
    contents are redacted in responses
  • Persistent guard auto-restores rules after session resets

Related Skills

  • skill-security-audit — Audit existing skills for security vulnerabilities and compliance gaps
  • secure-key-manager — Encrypt and manage API keys with runtime decryption and output sanitization
  • security-drill — Conduct automated attack simulations and validate incident response

About UniqueClub

This skill is part of the UniqueClub security toolkit. 🌐 https://uniqueclub.ai | 📂 https://github.com/wulaosiji/skills