Free workspace integrity verification for OpenClaw, Claude Code, and any Agent Skills-compatible tool.
Detects unauthorized modifications to agent identity and memory files and scans for prompt injection patterns — the post-installation security layer that other tools miss.
Looking for automated countermeasures? See openclaw-warden-pro for snapshot restore, skill quarantine, git rollback, and automated protection sweeps.
AI agents read workspace files (SOUL.md, AGENTS.md, IDENTITY.md, memory files) on every session startup and trust them implicitly. Existing security tools scan skills before installation. Nothing monitors the workspace itself afterward.
A compromised skill, a malicious payload, or any process with file access can inject hidden instructions, embed exfiltration URLs, override safety boundaries, or plant persistent backdoors.
This skill detects all of these.
# Clone
git clone https://github.com/AtlasPA/openclaw-warden.git
# Copy to your workspace skills directory
cp -r openclaw-warden ~/.openclaw/workspace/skills/# Establish baseline
python3 scripts/integrity.py baseline
# Check for modifications + injections
python3 scripts/integrity.py full
# Quick health check
python3 scripts/integrity.py status
# Accept a legitimate change
python3 scripts/integrity.py accept SOUL.mdAll commands accept --workspace /path/to/workspace. If omitted, auto-detects from $OPENCLAW_WORKSPACE, current directory, or ~/.openclaw/workspace.
- Modified files (SHA-256 checksum comparison)
- Deleted files
- New untracked files
- Instruction override — "ignore previous instructions", "you are now", "forget your instructions"
- System prompt markers —
<system>,[SYSTEM],<<SYS>>,[INST] - Markdown exfiltration — Image tags with encoded data in URLs
- Base64 payloads — Large encoded blobs outside code blocks
- Unicode manipulation — Zero-width characters, RTL overrides, homoglyphs
- HTML injection —
<script>,<iframe>, hidden elements - Shell injection —
$(...)subshell execution outside code blocks
- Respects markdown fenced code blocks (no false positives on documented examples)
- Skips its own files (which describe injection patterns)
- Distinguishes file categories: critical, memory, config, skills
| Category | Files | Alert Level |
|---|---|---|
| Critical | SOUL.md, AGENTS.md, IDENTITY.md, USER.md, TOOLS.md, HEARTBEAT.md | WARNING |
| Memory | memory/*.md, MEMORY.md | INFO |
| Config | *.json in workspace root | WARNING |
| Skills | skills/*/SKILL.md | WARNING |
Injection patterns always trigger CRITICAL regardless of category.
| Code | Meaning |
|---|---|
| 0 | Clean |
| 1 | Modifications detected |
| 2 | Injection patterns detected |
| Feature | Free | Pro |
|---|---|---|
| Baseline checksums | Yes | Yes |
| Integrity verification | Yes | Yes |
| Injection scanning | Yes | Yes |
| Snapshot restore | - | Yes |
| Git rollback | - | Yes |
| Skill quarantine | - | Yes |
| Automated protect | - | Yes |
| Session startup hook | - | Yes |
- Python 3.8+
- No external dependencies (stdlib only)
- Cross-platform: Windows, macOS, Linux
MIT