You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Security audit toolkit for OpenClaw deployments. Scans 63 checks across 8 categories. Use when asked to audit security, harden an installation, check for vulnerabilities, or review config safety.
version
1.2.0
author
MikeeBuilds
license
MIT
platforms
macOS
Linux
When to Use
User asks to "audit security", "check for vulnerabilities", or "harden" an OpenClaw deployment
After installing or updating OpenClaw or any skill
Before deploying to production
During security reviews or incident response
When investigating suspicious skill behavior
Installation
Method 1: npx (no install)
npx clawpinch
Method 2: Global install
npm install -g clawpinch
clawpinch
Method 3: From source
git clone https://github.com/MikeeBuilds/clawpinch.git
cd clawpinch
bash clawpinch.sh
CLI Commands
# Standard interactive scan
clawpinch
# Deep scan (supply-chain hash verification, full skill decompilation)
clawpinch --deep
# JSON output for programmatic consumption
clawpinch --json
# Quiet mode — summary line only
clawpinch --quiet
# Show auto-fix commands in report
clawpinch --fix
# Skip interactive menu
clawpinch --no-interactive
# AI-powered remediation — scan then pipe to Claude for automated fixing
clawpinch --remediate
# Target specific config directory
clawpinch --config-dir /path/to/openclaw/config
# Version info
clawpinch --version
Output Schema
Each finding is a JSON object:
{
"id": "CHK-CFG-001",
"severity": "critical | warn | info | ok",
"title": "Short description",
"description": "Detailed explanation",
"evidence": "Relevant snippet or value",
"remediation": "How to fix",
"auto_fix": "Shell command to fix (may be empty)"
}
# Slash commands (when repo is open in Claude Code)
/clawpinch-scan # Run security audit
/clawpinch-fix # Scan and fix all findings# Direct remediation
clawpinch --remediate