Loading...
Loading...
Step-by-step incident response for OpenClaw security breaches. Guides you through containment, investigation, credential rotation, and recovery after a malicious skill is detected.
npx skill4agent add useai-pro/openclaw-skills-security incident-responder| Level | Trigger | Example |
|---|---|---|
| SEV-1 (Critical) | Active data exfiltration confirmed | Credentials sent to external server |
| SEV-2 (High) | Malicious skill installed, unknown scope | Typosquat skill discovered |
| SEV-3 (Medium) | Suspicious behavior detected, unconfirmed | Unexpected network requests |
| SEV-4 (Low) | Policy violation, no confirmed malice | Over-privileged skill installed |
- Remove the skill from active configuration
- Kill any background processes it may have spawned
- Disconnect network if exfiltration is suspected- Do NOT delete the malicious SKILL.md — save a copy for analysis
- Save any logs from the OpenClaw session
- Screenshot any suspicious behavior observed
- Note the exact timestamp of installation and discovery- If running on a shared system, take it offline
- Revoke any API tokens the skill had access to
- Change passwords for any accounts accessible from the systemReview questions:
- Which files did the skill read? (especially .env, .ssh, .aws)
- Did the skill make network requests? To which endpoints?
- Did the skill execute shell commands? Which ones?
- Did the skill write or modify any files? Which ones?
- How long was the skill active before detection?Look for evidence of:
- Outbound network connections with POST bodies
- DNS queries to unusual domains
- Large data transfers in logs
- Base64-encoded data in request headers or URLsCheck these locations for modifications:
- ~/.bashrc, ~/.zshrc, ~/.profile (shell startup)
- ~/.ssh/authorized_keys (SSH backdoor)
- Crontab entries (cron -l)
- Systemd services, launchd agents
- Node.js postinstall scripts in package.json
- Git hooks (.git/hooks/)
- VS Code / editor extensionsIf the skill had network access:
- Check if it accessed internal services
- Review connected CI/CD pipelines
- Check cloud provider audit logs (AWS CloudTrail, etc.)
- Review git push history for unauthorized commitsCREDENTIAL ROTATION CHECKLIST
==============================
Priority 1 — Rotate immediately:
[ ] API keys found in .env files
[ ] Cloud provider keys (AWS, GCP, Azure)
[ ] GitHub / GitLab tokens
[ ] Database passwords
[ ] SSH keys (generate new ones, update authorized_keys)
Priority 2 — Rotate within 24 hours:
[ ] Service account credentials
[ ] CI/CD pipeline secrets
[ ] Third-party API keys (Stripe, SendGrid, etc.)
[ ] Container registry tokens
[ ] Package registry tokens (npm, PyPI)
Priority 3 — Rotate within 1 week:
[ ] Personal passwords for connected services
[ ] OAuth application secrets
[ ] Encryption keys (if the skill accessed them)
[ ] Signing certificates- Delete the SKILL.md from configuration
- Check for modified files and restore from git
- Remove any files the skill created
- Clean up any persistence mechanisms found in Phase 2- Install the config-hardener skill and run it
- Enable sandbox mode for all skills
- Review and tighten AGENTS.md
- Enable audit logging- Run credential-scanner to check for remaining exposed secrets
- Run skill-vetter on all remaining installed skills
- Check git status for uncommitted changes
- Verify no unknown processes are runningINCIDENT REPORT
===============
Date: <date>
Severity: SEV-<level>
Skill involved: <name, source>
Duration of exposure: <time>
Data potentially compromised: <list>
Credentials rotated: <list>
Actions taken: <summary>
Lessons learned: <what to do differently>