Security monitoring toolkit for OpenClaw agents. Runs automated checks against your infrastructure and reports issues.
- SSL Certificate Monitoring — Check expiry dates and alert on certificates nearing expiration
- GitHub Security Audits — Monitor repos for vulnerabilities, check Dependabot status, detect unexpected repos
- Breach Monitoring — HaveIBeenPwned API integration to check for compromised accounts
- Credential Rotation Tracking — Track and alert on overdue credential rotations
- Secret Scanning — Scan repositories and files for leaked secrets and API keys
- Git Hygiene Audits — Check git history for security issues
- Token Watchdog — Monitor token validity and expiration
- Permission Auditing — Audit file and access permissions
- Clone this repository:
git clone https://github.com/arc-claw-bot/arc-sentinel.git
cd arc-sentinel- Create configuration file:
cp sentinel.conf.example sentinel.conf- Edit
sentinel.confwith your values:
- DOMAINS — Space-separated list of domains to check SSL certificates
- GITHUB_USER — GitHub username for repo audits
- KNOWN_REPOS — Space-separated list of expected repo names
- MONITOR_EMAIL — Email address for HaveIBeenPwned breach checks
- HIBP_API_KEY — Optional; HIBP v3 API key for automated breach lookups
- Customize
credential-tracker.jsonwith your credentials and rotation policies
Run a full security scan:
bash sentinel.sh- Formatted report to stdout with color-coded severity
- JSON report saved to
reports/YYYY-MM-DD.json - Exit codes:
0= all clear,1= warnings,2= critical
| Script | Purpose |
|---|---|
scripts/secret-scanner.sh |
Scan repos/files for leaked secrets and API keys |
scripts/git-hygiene.sh |
Audit git history for security issues |
scripts/token-watchdog.sh |
Monitor token validity and expiry |
scripts/permission-auditor.sh |
Audit file and access permissions |
scripts/skill-auditor.sh |
Audit installed skills for security |
scripts/full-audit.sh |
Run all scripts in sequence |
For OpenClaw agents, use during heartbeats or on-demand:
- Run
bash sentinel.shfrom the skill directory - Review output for WARN or CRITICAL items
- Report findings if attention is needed
- Update
credential-tracker.jsonwhen credentials are rotated
Set up weekly scans with cron:
# Weekly Monday 9am
0 9 * * 1 cd /path/to/arc-sentinel && bash sentinel.sh >> reports/cron.log 2>&1openssl(SSL checks)ghCLI authenticated (GitHub checks)curl(HIBP API calls)python3(JSON processing)
MIT License
Issues and pull requests welcome!