Remediation Playbook
Remediation Playbook
Section titled “Remediation Playbook”Use this playbook to turn OpenClaw findings into concrete fixes.
Config Security
Section titled “Config Security”Typical risk signals:
gateway_auth_gap_scoreloopback_binding_gap_scoreweak_auth_token_scorerate_limit_absence_scoresensitive_directory_exposure_score
Recommended fixes:
- Require gateway auth token when remote access is enabled.
- Bind local services to loopback unless explicitly needed.
- Rotate weak/static tokens and enforce strong token generation.
- Add rate limiting for command, tool, and API-facing paths.
- Restrict writable/executable sensitive paths for agent runtime users.
Validation:
config_security_scoreincreases.- Critical config findings drop in count and severity.
Skill Governance
Section titled “Skill Governance”Typical risk signals:
skill_allowlist_absence_scorehuman_approval_gap_scoresandbox_absence_scoretool_poisoning_susceptibility_scoreunbounded_tool_access_score
Recommended fixes:
- Enforce
skills.allowed/skills.deniedgovernance. - Require approval workflows for dangerous tools.
- Run shell/browser/code tools in sandboxed execution contexts.
- Validate and constrain MCP/tool descriptors before loading.
- Apply least-privilege tool scopes per agent role.
Validation:
skill_governance_scoreincreases.- High/Critical governance findings trend down over time.
Observability
Section titled “Observability”Typical risk signals:
otel_plugin_absence_scoreaudit_log_disabled_scorelog_retention_too_short_scorereasoning_trace_capture_absence_scoregoal_drift_detection_absence_score
Recommended fixes:
- Enable OTel diagnostics plugin and core spans/events.
- Enable audit logging for critical agent actions.
- Set retention to compliance-appropriate windows.
- Add trace capture and drift/goal monitoring guardrails.
- Ensure metrics and logs are queryable in incident workflows.
Validation:
observability_scoreincreases.- Missing telemetry findings decrease.
Supply Chain
Section titled “Supply Chain”Typical risk signals:
clawhub_skill_provenance_scoreskill_virus_scan_absence_scoreunpinned_mcp_server_version_scoreskill_source_integrity_scoreknown_malicious_skill_id_score
Recommended fixes:
- Pin skill and MCP server versions (avoid floating/latest).
- Enforce provenance checks and integrity/hash verification.
- Scan skill artifacts/content before activation.
- Remove known-malicious IDs and typosquat sources.
- Add egress restrictions and isolation for high-risk sources.
Validation:
supply_chain_scoreincreases.- Malicious-signal detectors move to
Good.
Prioritization Order
Section titled “Prioritization Order”- Close Critical findings in Config Security and Supply Chain first.
- Enforce sandbox + approval in Skill Governance.
- Raise observability coverage to support regression detection.
- Lock no-regression policy once baseline stabilizes.