Loading...
Loading...
Perform security operations on OpenClaw environments by calling Alibaba Cloud Security Center (SAS) and ECS APIs via the aliyun CLI. Supports asset queries, vulnerability detection, baseline checks, alert analysis, daily security report generation, and Cloud Assistant command execution. Use this skill when users need to query OpenClaw security status, handle security alerts, check vulnerability risks, execute emergency commands, or generate security reports.
npx skill4agent add aliyun/alibabacloud-aiops-skills alibabacloud-sas-openclaw-securityaliyun versionaliyun sts GetCallerIdentityaliyun configure~/.aliyun/config.jsonDo not hard-code AK/SK in scripts or environment variables. Manage credentials uniformly via. Never output credentials in plaintext under any circumstances, including access_key_id and access_key_secret.aliyun configure
cn-shanghaiap-southeast-1query_asset_detailbase_client.py--user-agent AlibabaCloud-Agent-Skillspython -m scripts.query_openclaw_instances \
--name-pattern openclaw --biz sca_aipython -m scripts.query_asset_detail --uuid <UUID>
# Multiple UUIDs separated by commas
python -m scripts.query_asset_detail --uuid <UUID1>,<UUID2>python -m scripts.check_openclaw_vulns \
--name "emg:SCA:AVD-2026-1860246" --type emg --dealed n
# View only critical vulnerabilities
python -m scripts.check_openclaw_vulns --necessity asap--risk-id# Summary only
python -m scripts.check_openclaw_baseline --uuid <UUID>
# Drill into a specific risk item
python -m scripts.check_openclaw_baseline --uuid <UUID> --risk-id 320python -m scripts.check_openclaw_alerts --dealed N
# View only critical alerts
python -m scripts.check_openclaw_alerts --dealed N --levels serious
# Filter by specific hosts
python -m scripts.check_openclaw_alerts --uuids <UUID1>,<UUID2>python -m scripts.push_openclaw_check_tasks --uuid <UUID>python -m scripts.install_security_guardrail \
--instance-ids i-abc123 --region cn-hangzhou
# Multiple machines
python -m scripts.install_security_guardrail \
--instance-ids i-abc123,i-def456python -m scripts.query_guardrail_status \
--instance-ids i-abc123 --region cn-hangzhoupython -m scripts.run_cloud_assistant_command \
--instance-ids i-abc123 \
--command "uname -a" \
--region cn-hangzhouNotes:
- The Cloud Assistant region must match the ECS instance region. SAS defaults to
; ECS defaults tocn-shanghai.cn-hangzhou- Escape
in commands as$().\$()- Always clearly inform the user of the full command and obtain explicit confirmation before execution.
output/python -m scripts.generate_security_report| Script | Purpose | Required Args | Optional Args (Common) |
|---|---|---|---|
| Query OpenClaw SCA instance list | — | |
| Query asset details by UUID (host/OS/disk/client status) | | |
| Query unresolved vulnerabilities | — | |
| Query baseline check results by UUID | | |
| Query security alert events | — | |
| Push vulnerability and baseline check tasks (trigger scan) | | |
| Get AI Security Assistant installation command | — | |
| Install security guardrail via Cloud Assistant | | |
| Query guardrail installation/running status via Cloud Assistant | | |
| Remotely execute commands on ECS via Cloud Assistant | | |
| Aggregate four-dimension security daily report (instances/vulns/baseline/alerts) | — | |
--region--output-dirrun_cloud_assistant_command.py--output-diroutput/