Skip to content

Commit ae7e471

Browse files
adversa-aiclaude
andcommitted
fix: use npx openclaw in all CLI references
openclaw is not typically installed globally, so all CLI commands now use npx openclaw instead of bare openclaw. Updated across both READMEs, SKILL.md, skill README, and emergency-response.sh output. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
1 parent f8fc49b commit ae7e471

6 files changed

Lines changed: 44 additions & 44 deletions

File tree

README.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -124,10 +124,10 @@ git clone https://github.com/adversa-ai/secureclaw.git
124124
cd secureclaw/secureclaw
125125
npm install
126126
npm run build
127-
openclaw plugins install -l .
127+
npx openclaw plugins install -l .
128128
```
129129

130-
The plugin includes the skill. After installing, run `openclaw secureclaw skill install` to deploy the skill files to your agent's workspace.
130+
The plugin includes the skill. After installing, run `npx openclaw secureclaw skill install` to deploy the skill files to your agent's workspace.
131131

132132
### Option C: ClawHub
133133

@@ -270,10 +270,10 @@ Each finding includes: check ID, severity, OWASP ASI reference, evidence string,
270270
Run via CLI:
271271

272272
```sh
273-
openclaw secureclaw audit # Standard audit
274-
openclaw secureclaw audit --deep # Includes active TCP port probing
275-
openclaw secureclaw audit --json # Machine-readable JSON output
276-
openclaw secureclaw audit --fix # Auto-apply fixes after audit
273+
npx openclaw secureclaw audit # Standard audit
274+
npx openclaw secureclaw audit --deep # Includes active TCP port probing
275+
npx openclaw secureclaw audit --json # Machine-readable JSON output
276+
npx openclaw secureclaw audit --fix # Auto-apply fixes after audit
277277
```
278278

279279
---
@@ -301,8 +301,8 @@ Every destructive change creates a timestamped backup first. The gateway config
301301
The plugin provides 5 hardening modules with backup/rollback:
302302

303303
```sh
304-
openclaw secureclaw harden --full # Apply all modules
305-
openclaw secureclaw harden --rollback # Revert to last backup
304+
npx openclaw secureclaw harden --full # Apply all modules
305+
npx openclaw secureclaw harden --rollback # Revert to last backup
306306
```
307307

308308
Modules run in priority order: gateway, credentials, config, Docker, network. A manifest file records exactly what was changed and when.
@@ -623,7 +623,7 @@ SecureClaw maps to all 10 categories of the [OWASP Agentic Security Initiative](
623623

624624
When the full plugin is installed, these commands are available:
625625

626-
### openclaw secureclaw audit
626+
### npx openclaw secureclaw audit
627627

628628
Run the 51-check security audit.
629629

@@ -633,7 +633,7 @@ Run the 51-check security audit.
633633
| `--deep` | Enable active network probes (TCP port scanning) |
634634
| `--fix` | Automatically apply fixes after the audit completes |
635635

636-
### openclaw secureclaw harden
636+
### npx openclaw secureclaw harden
637637

638638
Apply hardening across 5 modules (gateway, credentials, config, Docker, network).
639639

@@ -642,27 +642,27 @@ Apply hardening across 5 modules (gateway, credentials, config, Docker, network)
642642
| `--full` | Apply all modules without interactive prompts |
643643
| `--rollback [timestamp]` | Revert to a previous backup. If no timestamp is given, reverts to the most recent backup. |
644644

645-
### openclaw secureclaw status
645+
### npx openclaw secureclaw status
646646

647647
Display current security posture: score, monitor status (credential watch, memory integrity, cost tracking), and recent alert count.
648648

649-
### openclaw secureclaw scan-skill \<name\>
649+
### npx openclaw secureclaw scan-skill \<name\>
650650

651651
Scan a specific skill for malicious patterns before installation. Checks for dynamic execution, credential access, exfiltration endpoints, IOC hash matches, and typosquatting.
652652

653-
### openclaw secureclaw cost-report
653+
### npx openclaw secureclaw cost-report
654654

655655
Display cost monitoring data: hourly/daily/monthly spend, projections, and whether the circuit breaker has tripped.
656656

657-
### openclaw secureclaw skill install
657+
### npx openclaw secureclaw skill install
658658

659659
Install the SecureClaw skill to your agent's skills directory. Equivalent to running `install.sh` manually.
660660

661-
### openclaw secureclaw skill update
661+
### npx openclaw secureclaw skill update
662662

663663
Re-run the skill installer to update to the latest version. Backs up the existing installation.
664664

665-
### openclaw secureclaw skill uninstall
665+
### npx openclaw secureclaw skill uninstall
666666

667667
Remove the SecureClaw skill. Performs a dry run by default; prompts for confirmation before deletion.
668668

@@ -823,7 +823,7 @@ After uninstalling, manually edit `SOUL.md` to remove the `## SecureClaw Privacy
823823
### Remove the plugin
824824

825825
```sh
826-
openclaw plugins uninstall secureclaw
826+
npx openclaw plugins uninstall secureclaw
827827
```
828828

829829
### Remove both

secureclaw/README.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -124,10 +124,10 @@ git clone https://github.com/adversa-ai/secureclaw.git
124124
cd secureclaw/secureclaw
125125
npm install
126126
npm run build
127-
openclaw plugins install -l .
127+
npx openclaw plugins install -l .
128128
```
129129

130-
The plugin includes the skill. After installing, run `openclaw secureclaw skill install` to deploy the skill files to your agent's workspace.
130+
The plugin includes the skill. After installing, run `npx openclaw secureclaw skill install` to deploy the skill files to your agent's workspace.
131131

132132
### Option C: ClawHub
133133

@@ -270,10 +270,10 @@ Each finding includes: check ID, severity, OWASP ASI reference, evidence string,
270270
Run via CLI:
271271

272272
```sh
273-
openclaw secureclaw audit # Standard audit
274-
openclaw secureclaw audit --deep # Includes active TCP port probing
275-
openclaw secureclaw audit --json # Machine-readable JSON output
276-
openclaw secureclaw audit --fix # Auto-apply fixes after audit
273+
npx openclaw secureclaw audit # Standard audit
274+
npx openclaw secureclaw audit --deep # Includes active TCP port probing
275+
npx openclaw secureclaw audit --json # Machine-readable JSON output
276+
npx openclaw secureclaw audit --fix # Auto-apply fixes after audit
277277
```
278278

279279
---
@@ -301,8 +301,8 @@ Every destructive change creates a timestamped backup first. The gateway config
301301
The plugin provides 5 hardening modules with backup/rollback:
302302

303303
```sh
304-
openclaw secureclaw harden --full # Apply all modules
305-
openclaw secureclaw harden --rollback # Revert to last backup
304+
npx openclaw secureclaw harden --full # Apply all modules
305+
npx openclaw secureclaw harden --rollback # Revert to last backup
306306
```
307307

308308
Modules run in priority order: gateway, credentials, config, Docker, network. A manifest file records exactly what was changed and when.
@@ -623,7 +623,7 @@ SecureClaw maps to all 10 categories of the [OWASP Agentic Security Initiative](
623623

624624
When the full plugin is installed, these commands are available:
625625

626-
### openclaw secureclaw audit
626+
### npx openclaw secureclaw audit
627627

628628
Run the 51-check security audit.
629629

@@ -633,7 +633,7 @@ Run the 51-check security audit.
633633
| `--deep` | Enable active network probes (TCP port scanning) |
634634
| `--fix` | Automatically apply fixes after the audit completes |
635635

636-
### openclaw secureclaw harden
636+
### npx openclaw secureclaw harden
637637

638638
Apply hardening across 5 modules (gateway, credentials, config, Docker, network).
639639

@@ -642,27 +642,27 @@ Apply hardening across 5 modules (gateway, credentials, config, Docker, network)
642642
| `--full` | Apply all modules without interactive prompts |
643643
| `--rollback [timestamp]` | Revert to a previous backup. If no timestamp is given, reverts to the most recent backup. |
644644

645-
### openclaw secureclaw status
645+
### npx openclaw secureclaw status
646646

647647
Display current security posture: score, monitor status (credential watch, memory integrity, cost tracking), and recent alert count.
648648

649-
### openclaw secureclaw scan-skill \<name\>
649+
### npx openclaw secureclaw scan-skill \<name\>
650650

651651
Scan a specific skill for malicious patterns before installation. Checks for dynamic execution, credential access, exfiltration endpoints, IOC hash matches, and typosquatting.
652652

653-
### openclaw secureclaw cost-report
653+
### npx openclaw secureclaw cost-report
654654

655655
Display cost monitoring data: hourly/daily/monthly spend, projections, and whether the circuit breaker has tripped.
656656

657-
### openclaw secureclaw skill install
657+
### npx openclaw secureclaw skill install
658658

659659
Install the SecureClaw skill to your agent's skills directory. Equivalent to running `install.sh` manually.
660660

661-
### openclaw secureclaw skill update
661+
### npx openclaw secureclaw skill update
662662

663663
Re-run the skill installer to update to the latest version. Backs up the existing installation.
664664

665-
### openclaw secureclaw skill uninstall
665+
### npx openclaw secureclaw skill uninstall
666666

667667
Remove the SecureClaw skill. Performs a dry run by default; prompts for confirmation before deletion.
668668

@@ -823,7 +823,7 @@ After uninstalling, manually edit `SOUL.md` to remove the `## SecureClaw Privacy
823823
### Remove the plugin
824824

825825
```sh
826-
openclaw plugins uninstall secureclaw
826+
npx openclaw plugins uninstall secureclaw
827827
```
828828

829829
### Remove both

secureclaw/skill/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Re-run the installer — it detects the existing version, backs up, and overwrit
5050
bash skill/scripts/install.sh
5151
```
5252

53-
Or via plugin CLI: `openclaw secureclaw skill update`
53+
Or via plugin CLI: `npx openclaw secureclaw skill update`
5454

5555
## Uninstall
5656

@@ -66,7 +66,7 @@ Actually remove:
6666
bash ~/.openclaw/skills/secureclaw/scripts/uninstall.sh --force
6767
```
6868

69-
Or via plugin CLI: `openclaw secureclaw skill uninstall`
69+
Or via plugin CLI: `npx openclaw secureclaw skill uninstall`
7070

7171
## Quick Start
7272

secureclaw/skill/SKILL.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,6 @@ Replace SKILL_DIR with the actual path to this skill:
9393
- If part of plugin: `~/.openclaw/extensions/secureclaw/skill`
9494

9595
If the SecureClaw plugin is installed, prefer plugin commands:
96-
- `openclaw secureclaw audit` instead of quick-audit.sh
97-
- `openclaw secureclaw harden` instead of quick-harden.sh
98-
- `openclaw secureclaw emergency` instead of emergency-response.sh
96+
- `npx openclaw secureclaw audit` instead of quick-audit.sh
97+
- `npx openclaw secureclaw harden` instead of quick-harden.sh
98+
- `npx openclaw secureclaw emergency` instead of emergency-response.sh

secureclaw/skill/checksums.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
2-
"README.md": "cb1ed95ccdd647c30f6e120a46d7b4e8514c59decf4eb24a3e16b9cef55ffe5e",
3-
"SKILL.md": "5469d7eb14cdeabe1492b527c7e3edd08850c3c4045c63083557e62ef1fa2a57",
2+
"README.md": "d99bdd8036a75e350fbba16e0b3969945ae2253c25414ca23edd6aff93c6dd4d",
3+
"SKILL.md": "c113317610d0b19fbfa92c552f796d7c4129dca58ded54edc1ca5f54002237f0",
44
"skill.json": "5b1244a30f2cf83e736b4975186291b29b50cabcb9a4623fc535d5fc1035afbc",
55
"configs/dangerous-commands.json": "b9c0be69df0ddb7bd2e9eade54e37212f62f15a9f9a28777998e9e07cf1d6f7e",
66
"configs/injection-patterns.json": "a8e6391d793861280a704ccdcd4a8fea1ae8439b558768535c7753549429753c",
@@ -9,7 +9,7 @@
99
"scripts/check-advisories.sh": "a25dbaa762e0e38a1907f17ed57d820cbb854cdee1da306eb594083057d10d54",
1010
"scripts/check-integrity.sh": "d0278ca3ca5bcd8312218590d335b7c99401a2e01052733fd065f998838674ee",
1111
"scripts/check-privacy.sh": "c9943e7edb11b01c1907278443032197a778d2db0734908741c2d1d019fcf4ca",
12-
"scripts/emergency-response.sh": "e56c3d014584140089a4d4e8fd2d856bff207f6dc2d1e6bf36e241c127429af0",
12+
"scripts/emergency-response.sh": "92767a4e252ea5fe7948db1cef52220a980d091bf62355382db69bf22377eb2a",
1313
"scripts/install.sh": "d5510b6d4b13c31e2f3d9688682e26e56574f70cbded3d75c95ed623ce8bd4e5",
1414
"scripts/quick-audit.sh": "aaf19fedbbe2489a40da10c01b7fbcecceab1bda934c6f1377f2bcf8ca182901",
1515
"scripts/quick-harden.sh": "96a747ac3a026a72e40e3bd1de50e92c62b7bb445a8a000f8735910d06f8efc5",

secureclaw/skill/scripts/emergency-response.sh

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,5 +76,5 @@ echo " 5. Review installed skills for unfamiliar entries"
7676
echo " 6. Check if gateway was exposed: netstat -an | grep 18789"
7777
echo ""
7878
echo " For automated incident response, install the full plugin:"
79-
echo " openclaw plugins install secureclaw"
80-
echo " openclaw secureclaw audit"
79+
echo " npx openclaw plugins install secureclaw"
80+
echo " npx openclaw secureclaw audit"

0 commit comments

Comments
 (0)