Security posture, third-party scan context, and remediation history for inference-optimizer. Routine release bullets also appear in CHANGELOG.md.
Use GitHub Security Advisories for private reports, or open an issue for non-sensitive questions.
- ClawHub runs VirusTotal (and other checks) on published skill packages. The listing for this skill: inference-optimizer on ClawHub. New publishes can change scan results; re-scan after fixes.
- v0.2.0 in this repo was shipped as security remediation following a VirusTotal-oriented review of the skill contents (see git history:
v0.2.0: Security remediation per VirusTotal audit). - Ongoing remediation: Dependency alerts, Dependabot, and the dependency/security overview for the repository are tracked on GitHub → Security. Several follow-up passes have been applied there after publish.
- Runtime before tuning: Audit gateway ownership, services, resolved
openclawpath, workspace wiring for this skill, updater/allowlist coverage, plugin signals, then session/context behavior—before inference or token tuning. - Audit is read-only:
/auditinspects and reports; it does not purge, rewrite workspace files, deploy, or restart services. - Diagnosis: Warnings are not root cause by themselves; partial or truncated output is inconclusive until version, service state, and logs are verified.
- Allowlists: Match resolved paths (
which,command -v,readlink -f). Prefer bounded NVM patterns over basename-onlyopenclawentries. For this skill’s scripts, prefer/usr/bin/bashplus one approval line per script path under<skill_dir>/scripts/(seeSKILL.md). Avoid/usr/bin/bash *and/usr/bin/bash **in allowlists—they are broader than required and are not recommended here.
/home/ubuntu/.nvm/versions/node/*/bin/openclaw
/home/ubuntu/.nvm/versions/node/*/bin/openclaw *
Use a second line only when your gateway requires separate entries for subcommands; keep wildcards as narrow as possible.
- Purge:
purge-stale-sessions.sharchives by default to~/openclaw-purge-archive/<timestamp>/; use--deleteonly for intentional immediate removal. - Setup:
setup.shis preview-first;--applychanges workspace instruction files and agent-facing behavior. - Data: Audit scripts aim for metadata in outputs; do not paste secrets; use
<redacted>(or equivalent placeholders) in examples.
This release keeps the command surface unchanged, but tightens how the skill should diagnose and recommend fixes in production OpenClaw environments.
- The skill now audits runtime health before suggesting inference tuning.
- The audit order now checks:
- gateway ownership and duplicate supervisors
- restart loops and failed services
- resolved
openclawbinary path and install type - workspace command wiring for the installed skill path
- updater status and allowlist coverage for the resolved path
- plugin provenance and unused local extensions
- only then context pressure, stale sessions, cache-trace, pruning, and concurrency
- Updater/process diagnosis now has stricter rules:
- warnings are not root cause by themselves
- partial or truncated output is inconclusive
- installed version, service state, and logs must be checked before naming a cause
- Allowlist guidance now explicitly prefers resolved executable paths and bounded NVM wildcards over basename-only rules.
README.mdwas simplified, with more operational detail kept here instead of the landing page.openclaw-audit.shnow checks runtime health, workspace command wiring, allowlist coverage, plugin provenance signals, and then token/session overhead.openclaw-audit.shnow emits aRecommended next stepssection so the audit produces actionable follow-up instead of raw metrics only.setup.shnow updates a managed workspace block idempotently and removes legacy references such as:~/clawdbot/code/scripts/openclaw-audit.sh~/clawdbot/code/scripts/purge-stale-sessions.sh/clawd/skills/public/inference-optimizer/...
verify.shnow fails when stale install paths or legacy workspace wiring are still present.
The March 14, 2026 VPS remediation exposed failure modes that pure token optimization guidance missed:
- duplicate gateway supervisors caused the largest live instability
- updater commands failed from chat because the allowlist covered the wrong path
- warning text from an untracked plugin was incorrectly treated as the updater failure cause
- the docs promised runtime-first checks before the shipped scripts actually performed them
This release updates the skill so those conditions are checked before tuning recommendations are made, and it adds install-time verification so dead VPS paths are caught immediately.
Report: Pre-scan still flagged "return raw output" and prescriptive phrasing ("return output"). Skill instructs agent to follow a workflow that could coerce behavior. Enforcement of redaction/metadata rules relies on the agent.
Changes:
- Replaced "return raw output" and "return output" with passive phrasing: "the script produces metadata that may be relayed"; "include the script's output in your response."
- Added disclaimer in
SKILL.mdthat these are workflow instructions, not system-prompt overrides. - Added a pre-install checklist to the old README structure.
- Manual install showed preview before
--apply. - Added script reference guidance for reviewer inspection.
Prescriptive prohibitions were replaced with descriptive workflow wording so the skill reads as guidance rather than a system override.
- Audit outputs metadata only.
- Rewrites must never surface secrets; use
<redacted>when examples require placeholders.
- Purge archives by default instead of deleting immediately.
- Broad wildcard allowlist guidance was removed in favor of manual execution or path-specific patterns.
setup.shbecame preview-first.--applybecame the explicit write path.
- Runtime-first audit guidance and stricter updater/process diagnosis.
- Resolved-path allowlist guidance (bounded NVM patterns).
- Archive-first cleanup; preview-first setup changes.
- Metadata-oriented audit output; explicit distinction from system-prompt overrides.