Conduct security audits for OpenClaw-based AI assistants on macOS to detect exposure risks, weak tokens, sensitive commands, and IP leaks.
ClawGears is a security audit tool for OpenClaw/MoltBot/ClawdBot users on macOS. It helps detect and fix security vulnerabilities that could expose your AI assistant to the public internet.
🌟 New in v1.4.0: Context-Aware Risk Explanations
Instead of one-size-fits-all "best practices", ClawGears now provides scenario-based risk analysis:
Use this skill when:
Supported Languages: ClawGears README is available in 7 languages:
| Binary | Purpose |
|---|---|
python3 | JSON parsing |
curl | HTTP requests, IP detection |
lsof | Port and process inspection |
pgrep / pkill | Process management |
openssl | Token generation |
socketfilterfw | macOS firewall control (/usr/libexec/ApplicationFirewall/socketfilterfw) |
| Path | Purpose |
|---|---|
~/.openclaw/openclaw.json | OpenClaw configuration (token, gateway settings) |
~/.openclaw/logs/ | Gateway logs for anomaly detection |
/Library/Application Support/com.apple.TCC/TCC.db | macOS TCC database (Full Disk Access, Accessibility) |
~/Library/Application Support/com.apple.TCC/TCC.db | User-level TCC database |
| Path | Purpose |
|---|---|
./history/ | Audit result storage (JSON, HTML reports) |
./reports/ | Generated audit reports |
~/.openclaw/openclaw.json | Configuration fixes (with --fix flag only) |
| Domain | Purpose | Data Sent |
|---|---|---|
api.ipify.org | Public IP detection | None (GET request) |
icanhazip.com | Public IP detection (fallback) | None |
ifconfig.me/ip | Public IP detection (fallback) | None |
| Domain | Purpose | Data Sent |
|---|---|---|
openclaw.allegro.earth | OpenClaw exposure database check | Your public IP |
search.censys.io | Censys scan database (link only, manual check) | None from script |
www.shodan.io | Shodan scan database (link only, manual check) | None from script |
Before running this skill, please be aware:
IP Transmission: Your public IP address will be sent to:
api.ipify.org (or fallback services) for IP detectionopenclaw.allegro.earth for exposure database checkLocal File Access: This skill reads:
System Changes: The interactive-fix.sh script can:
sudo for firewall changesRecommendation: Review scripts before running. Run quick-check.sh first (read-only) before applying any fixes.
Use this section to understand each risk, its actual impact, and whether it applies to your situation.
| Risk | What It Protects | Real Impact | Fix Priority |
|---|---|---|---|
| Gateway exposed | Prevent unauthorized access to your AI assistant | 🔴 Critical - Anyone on the internet can control your AI. Fix immediately if exposed. | Weak token |
- ✅ **Enable** if Mac is portable or in shared spaces
- ⚠️ **OK to disable** if you need **remote restart control** (e.g., for Mac-to-Mac sync)
- If disabled, consider physical security measures instead
| **IP in leak database** | Check if already exposed | 🟠 **High** - Your IP is in a public exposure database. **Check before panicking:**
- If you've been using OpenClaw for a while without issues, it IP may have been indexed already.
- If you just started, use the tool: do a quick check and not a leak.
| **iCloud sync enabled** | Prevent sensitive data cloud sync | 🟡 **Low** - iCloud may sync Documents, Desktop, Pictures by default. **Evaluate based on your needs:**
- ✅ **Enable** if you store sensitive data in these folders
- ⚠️ **OK to disable** if you don't store sensitive data in these locations
- If disabled, consider using .gitignore for excluding patterns
| **SIP disabled** | Protect system integrity | 🟡 **Low** - System-level protections are reduced. **Usually OK to keep enabled, - Only disable if you have a specific, legitimate reason (e.g., development, testing)
- If disabled, be extra cautious about what you install
Run a fast 5-second security audit (read-only, safe to run):
./scripts/quick-check.sh
This checks:
Run comprehensive security check:
./scripts/generate-report.sh --format html --output ./reports
Check if user's IP has been exposed in security databases:
./scripts/ip-leak-check.sh --all
Checks 3 databases:
⚠️ Requires explicit user consent before running
Automatically fix common security issues:
./scripts/interactive-fix.sh
Options:
--bind - Rebind Gateway to localhost--token - Generate new strong token--deny - Add sensitive commands to deny list--restart - Restart Gateway service--all - Fix all issuesWhen user asks about security:
First, run quick check to identify issues (read-only):
./scripts/quick-check.sh
If issues found, explain risks and ask for consent before fixing:
./scripts/interactive-fix.sh --all
Check IP exposure:
./scripts/ip-leak-check.sh --all
Generate report for records:
./scripts/generate-report.sh --format html
| Symbol | Meaning |
|---|---|
| ✅ PASS | Security check passed |
| ⚠️ WARN | Warning, review recommended |
| ❌ FAIL | Critical issue, fix immediately |
| Result | Action |
|---|---|
| IP NOT in database | Continue monitoring |
| IP FOUND in database | URGENT: Close public access, regenerate tokens |
Over 220,000 OpenClaw instances are publicly exposed. Many API keys have already leaked to hacker databases.
MIT-0 (ClawHub Platform License)
ZIP package — ready to use