[{"data":1,"prerenderedAt":1716},["ShallowReactive",2],{"blog-post-best-openclaw-skills-2026":3,"related-posts-best-openclaw-skills-2026":415},{"id":4,"title":5,"author":6,"body":10,"category":392,"date":393,"description":394,"extension":395,"featured":396,"image":397,"imageHeight":398,"imageWidth":398,"meta":399,"navigation":400,"path":401,"readingTime":402,"seo":403,"seoTitle":404,"stem":405,"tags":406,"updatedDate":393,"__hash__":414},"blog/blog/best-openclaw-skills-2026.md","Best OpenClaw Skills to Install in 2026 (and 5 That Will Steal Your API Keys)",{"name":7,"role":8,"avatar":9},"Shabnam Katoch","Growth Head","/img/avatars/shabnam-profile.jpeg",{"type":11,"value":12,"toc":371},"minimark",[13,17,20,23,26,29,32,37,44,49,56,62,68,72,84,90,96,100,106,117,123,129,135,139,142,148,154,165,171,177,183,187,193,199,205,215,221,231,234,238,244,247,253,259,265,271,277,280,288,292,295,298,301,304,307,317,321,325,328,332,335,339,357,361,364,368],[14,15,16],"p",{},"ClawHub has 10,700+ skills. 820+ are flagged malicious. A Snyk audit found 13.4% have critical security issues. Here are the 10 worth installing, the 5 red flags to watch for, and why \"just browse ClawHub\" is dangerous advice.",[14,18,19],{},"Cisco's security team found an OpenClaw skill performing data exfiltration without the user's knowledge. Not a theoretical vulnerability. Not a proof-of-concept. A skill on ClawHub, with real installs, quietly sending user data to an external server.",[14,21,22],{},"The user had no idea.",[14,24,25],{},"That's the ClawHub problem in one sentence. 10,700+ community-built skills. No mandatory code review. No security testing before publication. You search for \"Gmail automation,\" install something that looks right, and hope nobody slipped a credential harvester into the code.",[14,27,28],{},"In January 2026, researchers discovered ClawHavoc: 341 malicious skills using typosquatted names (\"clawhubb\" instead of \"clawhub\") distributing Atomic Stealer malware that exfiltrated SSH keys, API tokens, and browser cookies. ClawHub removed 2,419 suspicious skills and partnered with VirusTotal for scanning. But \"partnered with VirusTotal\" is not \"every skill is verified.\"",[14,30,31],{},"Here are the 10 skills actually worth installing, the 5 red flags that indicate a skill is malicious, and the verification checklist you should run before trusting anything on ClawHub.",[33,34,36],"h2",{"id":35},"the-10-openclaw-skills-worth-installing-verified-safe-actively-maintained","The 10 OpenClaw skills worth installing (verified safe, actively maintained)",[14,38,39],{},[40,41],"img",{"alt":42,"src":43},"Three-tier ranking of OpenClaw skills worth installing: foundation, productivity, and power user","/img/blog/best-openclaw-skills-2026-top-ten.jpg",[45,46,48],"h3",{"id":47},"tier-1-install-these-first-everyone-needs-them","Tier 1: Install these first (everyone needs them)",[14,50,51,55],{},[52,53,54],"strong",{},"1. Web Browsing (official, 180K+ installs)."," The most-installed skill on ClawHub. Your agent can navigate pages, extract content, and follow links. Without this, the agent is a chatbot running on stale training data. First-party skill. Zero registry risk.",[14,57,58,61],{},[52,59,60],{},"2. Web Search (Tavily or Brave)."," Web Browsing fetches pages. Web Search finds them. Tavily returns LLM-friendly structured results (1,000 free searches/month). Brave uses an independent index with freshness filtering ($5/month free credit). Pick one. Install both if you need coverage.",[14,63,64,67],{},[52,65,66],{},"3. Telegram Gateway."," The second most-installed skill (145K+ installs). Connect with a BotFather token. Message your agent from your phone. Setup: 5 minutes. Latency: surprisingly low. This is how 80% of OpenClaw users interact with their agent daily.",[45,69,71],{"id":70},"tier-2-productivity-install-after-your-agent-is-stable","Tier 2: Productivity (install after your agent is stable)",[14,73,74,77,78,83],{},[52,75,76],{},"4. GOG (Google Workspace, 14K+ installs)."," Gmail, Calendar, Drive, Docs, Sheets, Contacts through a single OAuth connection. For the complete Gmail and Calendar automation guide, our ",[79,80,82],"a",{"href":81},"/blog/openclaw-gmail-calendar-automation","guide"," covers the five workflows that save the most time.",[14,85,86,89],{},[52,87,88],{},"5. Screenshot & OCR."," Captures screenshots and extracts text using optical character recognition. 4/5 stars on ClawHub. Useful for documentation workflows, reading error dialogs, and digitizing printed text. Runs locally. No cloud API calls. Supports 60+ languages.",[14,91,92,95],{},[52,93,94],{},"6. Task Automation (cron)."," Schedule recurring tasks. Morning briefings at 7 AM. Weekly reports on Monday. Daily inbox triage. The backbone of any always-on agent workflow.",[45,97,99],{"id":98},"tier-3-power-user-install-only-if-you-need-the-specific-capability","Tier 3: Power user (install only if you need the specific capability)",[14,101,102,105],{},[52,103,104],{},"7. N8N Workflow Automation."," Connects OpenClaw to your N8N instance. Trigger complex multi-step workflows from chat. Runs locally. Data stays private. The bridge between your agent and your automation stack.",[14,107,108,111,112,116],{},[52,109,110],{},"8. ElevenLabs Voice Agent."," Gives OpenClaw a voice. The fail-safe mechanism is clever: if text/email fails, the bot automatically calls the recipient. For the OpenClaw voice agent setup with Twilio, our ",[79,113,115],{"href":114},"/blog/openclaw-voice-agents-twilio-meet","comparison"," covers how voice integrates with other channels.",[14,118,119,122],{},[52,120,121],{},"9. Capability Evolver (35K+ installs)."," The agent automatically improves its own capabilities during operation. Top of the ClawHub charts. Useful for long-running agents that need to adapt over time.",[14,124,125,128],{},[52,126,127],{},"10. Home Assistant."," Controls your smart home through natural language. No cloud dependency. No data leaving your network. Privacy-first home automation. \"Which devices are currently on?\" works as a chat command.",[14,130,131,134],{},[52,132,133],{},"The bundled skills rule:"," 53 skills ship bundled with OpenClaw as first-party plugins. These carry zero registry risk. Start with bundled skills. Add ClawHub skills only when bundled options don't cover your use case.",[33,136,138],{"id":137},"the-5-red-flags-that-mean-a-skill-is-malicious","The 5 red flags that mean a skill is malicious",[14,140,141],{},"Here's what nobody tells you about ClawHub security.",[14,143,144],{},[40,145],{"alt":146,"src":147},"Five red flags for malicious OpenClaw skills: no GitHub link, wildcard permissions, typosquatted name, stale and low installs, missing VirusTotal scan","/img/blog/best-openclaw-skills-2026-red-flags.jpg",[14,149,150,153],{},[52,151,152],{},"Red Flag 1: No linked GitHub repository."," Legitimate skills link to a maintained GitHub repo with issues, PRs, and commit history. If the ClawHub listing has no source code link, the author doesn't want you reading the code. That's the first sign.",[14,155,156,159,160,164],{},[52,157,158],{},"Red Flag 2: Wildcard shell permissions on a simple skill."," A weather skill that requests ",[161,162,163],"code",{},"Bash(*)"," access can execute any command on your system. The permission model exists. Use it. Read what the skill requests before confirming the install.",[14,166,167,170],{},[52,168,169],{},"Red Flag 3: Name mimics a popular skill (typosquatting)."," ClawHavoc used names like \"clawhubb\" instead of \"clawhub.\" Check the spelling carefully. Verify the publisher. If the name is one character off from a popular skill, it's almost certainly malicious.",[14,172,173,176],{},[52,174,175],{},"Red Flag 4: Stale with low installs."," Last updated 3+ months ago. Fewer than 100 installs. No reviews. This is either abandoned or was published as a one-time attack payload. Both are reasons not to install.",[14,178,179,182],{},[52,180,181],{},"Red Flag 5: Missing or non-benign VirusTotal scan."," Since February 2026, ClawHub shows VirusTotal scan results on each skill's page. If the scan says anything other than \"Benign,\" don't install. If there's no scan result at all, the skill predates the VirusTotal partnership and hasn't been re-scanned.",[33,184,186],{"id":185},"the-verification-checklist-run-this-before-every-clawhub-install","The verification checklist (run this before every ClawHub install)",[14,188,189],{},[40,190],{"alt":191,"src":192},"Five-step ClawHub skill verification checklist: VirusTotal scan, GitHub repo, SKILL.md permissions, install count and reviews, sandbox mode test","/img/blog/best-openclaw-skills-2026-verification-checklist.jpg",[14,194,195,198],{},[52,196,197],{},"Step 1:"," Check the VirusTotal scan on the ClawHub page. Must show \"Benign.\"",[14,200,201,204],{},[52,202,203],{},"Step 2:"," Click the GitHub repository link. Verify real commits, real issues, a real maintainer with other projects.",[14,206,207,210,211,214],{},[52,208,209],{},"Step 3:"," Read the ",[161,212,213],{},"SKILL.md",". What permissions does it request? A calendar skill doesn't need shell access. A search skill doesn't need file write.",[14,216,217,220],{},[52,218,219],{},"Step 4:"," Check the install count and reviews. Under 100 installs with zero reviews is a warning sign.",[14,222,223,226,227,230],{},[52,224,225],{},"Step 5:"," Enable sandbox mode before testing: ",[161,228,229],{},"openclaw config --global --sandbox=strict",". Test the skill with non-sensitive data first.",[14,232,233],{},"If running a 5-step security verification on every skill you install, monitoring ClawHub for typosquatted malware, reading SKILL.md permission manifests, and manually sandboxing untrusted code sounds like more security work than productivity work, BetterClaw's verified skills marketplace handles all of this. Every skill tested by our team before publication. No ClawHub registry risk. No VirusTotal manual checks. No malicious skill surprises. Free tier with 1 agent and BYOK. $19/month per agent for Pro.",[33,235,237],{"id":236},"the-security-numbers-that-should-concern-you","The security numbers that should concern you",[14,239,240],{},[40,241],{"alt":242,"src":243},"ClawHub security statistics: 10,700+ skills, 820+ flagged malicious, 13.4% with critical issues, 341 ClawHavoc payloads, 1 in 5 malicious pre-cleanup","/img/blog/best-openclaw-skills-2026-security-stats.jpg",[14,245,246],{},"Here's the data.",[14,248,249,252],{},[52,250,251],{},"10,700+ skills"," on ClawHub as of May 2026. After the ClawHavoc cleanup removed 2,419, the count has grown back.",[14,254,255,258],{},[52,256,257],{},"820+ flagged malicious"," by Cisco's analysis. That's 7.6% of the registry.",[14,260,261,264],{},[52,262,263],{},"13.4% have critical issues"," according to Snyk's independent audit. Malware, prompt injection, exposed API keys.",[14,266,267,270],{},[52,268,269],{},"341 skills distributed Atomic Stealer malware"," in the ClawHavoc campaign. Typosquatted names. Reverse shells. SSH key exfiltration.",[14,272,273,276],{},[52,274,275],{},"1 in 5 skills were malicious"," before the February 2026 cleanup, according to Koi Security's audit of 2,857 skills.",[14,278,279],{},"The math: If you install 10 random skills from ClawHub without vetting, statistically 1-2 of them have critical security issues. That's not a theoretical risk. That's a probability.",[14,281,282,283,287],{},"For the complete OpenClaw security analysis including CVEs and enterprise risks, our ",[79,284,286],{"href":285},"/blog/openclaw-security-2026","security guide"," covers the broader attack surface.",[33,289,291],{"id":290},"the-honest-take-why-we-built-a-verified-marketplace-instead","The honest take (why we built a verified marketplace instead)",[14,293,294],{},"Here's the perspective.",[14,296,297],{},"ClawHub is the most feature-rich skill ecosystem in AI agents. 10,700+ skills covering every use case imaginable. But an ecosystem with 7.6% malicious content and no mandatory code review is fundamentally different from an ecosystem where every skill is tested before publication.",[14,299,300],{},"We built BetterClaw's verified marketplace specifically because of ClawHavoc. After seeing 341 malicious skills steal SSH keys from real users, we decided that \"user beware\" is not an acceptable security model for an agent that has access to your email, calendar, files, and messaging apps.",[14,302,303],{},"The trade-off is real. BetterClaw's verified marketplace has fewer skills than ClawHub. We test every one. That takes time. The breadth is smaller. But every skill in our marketplace is verified safe. No credential harvesters. No cryptominers. No prompt injection. No typosquatting.",[14,305,306],{},"The 10 skills listed above are genuinely excellent. Install them with confidence after running the verification checklist. For everything else on ClawHub, proceed with the same caution you'd apply to installing a random npm package from an anonymous publisher on day one.",[14,308,309,310,316],{},"If you want the skill ecosystem without the security lottery, ",[79,311,315],{"href":312,"rel":313},"https://app.betterclaw.io/sign-in",[314],"nofollow","give BetterClaw a try",". Free tier with 1 agent and BYOK. $19/month per agent for Pro. Verified skills marketplace. Every skill tested. Zero ClawHub registry risk. The agent does the work. The skills are safe.",[33,318,320],{"id":319},"frequently-asked-questions","Frequently Asked Questions",[45,322,324],{"id":323},"what-are-the-best-openclaw-skills-to-install-in-2026","What are the best OpenClaw skills to install in 2026?",[14,326,327],{},"The top 10 by safety and utility: Web Browsing (180K installs, first-party), Web Search (Tavily or Brave), Telegram Gateway (145K installs), GOG Google Workspace (14K installs), Screenshot & OCR, Task Automation (cron), N8N Workflow, ElevenLabs Voice, Capability Evolver (35K installs), and Home Assistant. Start with the 53 bundled first-party skills before adding ClawHub community skills.",[45,329,331],{"id":330},"are-openclaw-skills-on-clawhub-safe","Are OpenClaw skills on ClawHub safe?",[14,333,334],{},"Not all of them. 820+ skills (7.6%) are flagged malicious. A Snyk audit found 13.4% have critical security issues. The ClawHavoc campaign distributed 341 malicious skills with Atomic Stealer malware through typosquatted names. ClawHub partnered with VirusTotal for scanning in February 2026, but verification is not mandatory. Always check the VirusTotal status, GitHub repo, permissions, and install count before installing.",[45,336,338],{"id":337},"how-do-i-install-openclaw-skills-from-clawhub","How do I install OpenClaw skills from ClawHub?",[14,340,341,342,345,346,349,350,353,354,356],{},"Run ",[161,343,344],{},"npx clawhub@latest install \u003Cskill-name>"," from your terminal. The installer shows the permissions the skill requests. Review them before confirming. After installation, run ",[161,347,348],{},"npx clawhub@latest list"," to see installed skills and ",[161,351,352],{},"npx clawhub@latest update"," to update all. Enable sandbox mode (",[161,355,229],{},") before testing untrusted skills.",[45,358,360],{"id":359},"how-much-do-openclaw-skills-cost","How much do OpenClaw skills cost?",[14,362,363],{},"Most ClawHub skills are free. The underlying services may have costs: Tavily search (1,000 free/month, then paid), ElevenLabs voice ($5+/month), N8N (self-hosted free, cloud $24+/month). BetterClaw's verified marketplace is included in all plans (free tier and $19/month Pro). No separate skill costs. No ClawHub registry risk.",[45,365,367],{"id":366},"what-is-the-clawhavoc-attack-and-should-i-be-worried","What is the ClawHavoc attack and should I be worried?",[14,369,370],{},"ClawHavoc was a coordinated attack in January 2026 where 341 malicious skills were uploaded to ClawHub using typosquatted names. These skills installed Atomic Stealer malware that exfiltrated SSH keys, API tokens, and browser session cookies via reverse shells. ClawHub removed 2,419 suspicious skills and implemented VirusTotal scanning. You should be cautious, not panicked. Use the verification checklist before every install. Or use BetterClaw's verified marketplace where every skill is tested before publication.",{"title":372,"searchDepth":373,"depth":373,"links":374},"",2,[375,381,382,383,384,385],{"id":35,"depth":373,"text":36,"children":376},[377,379,380],{"id":47,"depth":378,"text":48},3,{"id":70,"depth":378,"text":71},{"id":98,"depth":378,"text":99},{"id":137,"depth":373,"text":138},{"id":185,"depth":373,"text":186},{"id":236,"depth":373,"text":237},{"id":290,"depth":373,"text":291},{"id":319,"depth":373,"text":320,"children":386},[387,388,389,390,391],{"id":323,"depth":378,"text":324},{"id":330,"depth":378,"text":331},{"id":337,"depth":378,"text":338},{"id":359,"depth":378,"text":360},{"id":366,"depth":378,"text":367},"Security","2026-05-19","10,700+ skills on ClawHub. 820+ are malicious. Here are the 10 worth installing, 5 red flags for dangerous skills, and the verification checklist to stay safe.","md",false,"/img/blog/best-openclaw-skills-2026.jpg",null,{},true,"/blog/best-openclaw-skills-2026","11 min read",{"title":5,"description":394},"Best OpenClaw Skills 2026 (+ 5 to Avoid on ClawHub)","blog/best-openclaw-skills-2026",[407,408,409,410,411,412,413],"best OpenClaw skills","OpenClaw skills install","ClawHub skills safe","OpenClaw ClawHub malicious","OpenClaw skills 2026","ClawHavoc","OpenClaw skill security","HWDTWyxlkHHn6FFtHVb6l6tlT6fbn5bdtjiQEauyEj4",[416,795,1180],{"id":417,"title":418,"author":419,"body":420,"category":392,"date":774,"description":775,"extension":395,"featured":396,"image":776,"imageHeight":398,"imageWidth":398,"meta":777,"navigation":400,"path":778,"readingTime":779,"seo":780,"seoTitle":781,"stem":782,"tags":783,"updatedDate":398,"__hash__":794},"blog/blog/ai-agent-secrets-auto-purge.md","Secrets Auto-Purge: Why Your AI Agent Should Forget Your API Keys in 5 Minutes",{"name":7,"role":8,"avatar":9},{"type":11,"value":421,"toc":765},[422,425,428,431,434,438,441,448,451,454,462,468,472,475,478,485,488,494,504,510,516,519,522,528,532,535,538,541,544,547,553,557,560,563,634,642,646,649,655,661,667,675,681,685,688,691,694,697,700,707,714,720,722,727,730,735,741,746,749,754,757,762],[14,423,424],{},"A security researcher named Jamieson O'Reilly gained access to Anthropic API keys, Telegram bot tokens, Slack OAuth credentials, and months of complete chat histories from an OpenClaw instance. He could send messages on behalf of the user. He could execute commands with full system administrator privileges.",[14,426,427],{},"The credentials had been sitting in plaintext files for weeks. Not encrypted. Not scoped. Not time-limited. Just... there. Waiting.",[14,429,430],{},"This is the AI agent security problem that nobody is solving the right way. Every conversation about agent security focuses on CVEs and gateway vulnerabilities. Those matter. But the credential exposure problem is worse because it compounds over time. Every day your API keys sit in plaintext is another day they can be stolen. And on OpenClaw, they sit there forever.",[14,432,433],{},"Here's the attack scenario, why it works, and how secrets auto-purge eliminates it.",[33,435,437],{"id":436},"how-credentials-get-stored-the-default-is-terrifying","How credentials get stored (the default is terrifying)",[14,439,440],{},"When you configure OpenClaw, you provide credentials: API keys for your model provider, OAuth tokens for Slack or Gmail, bot tokens for Telegram, passwords for services your agent needs to access.",[14,442,443,444,447],{},"These credentials are stored in ",[161,445,446],{},"~/.openclaw/.env"," as plaintext JSON. No encryption. No access control. No expiration. Any process on the machine that can read files can read your credentials. Any skill installed on the agent can access them. Any vulnerability that grants file system access (CVE-2026-25253 did exactly this) exposes every credential simultaneously.",[14,449,450],{},"Kaspersky's security audit confirmed this directly: \"OpenClaw's configuration, memory, and chat logs store API keys, passwords, and other credentials for LLM and integration services in plain text.\" They then reported that RedLine and Lumma infostealers had already added OpenClaw file paths to their must-steal lists.",[14,452,453],{},"The credentials don't expire. They're written once and persist until you manually delete or rotate them. Most users never rotate. The Anthropic API key you entered in January is still in the same plaintext file in April. That's 90 days of exposure window.",[14,455,456,457,461],{},"For the ",[79,458,460],{"href":459},"/blog/openclaw-security-risks","complete analysis of OpenClaw's security vulnerabilities",", our security guide covers all three attack surfaces.",[14,463,464],{},[40,465],{"alt":466,"src":467},"The default is terrifying: here is exactly what gets stored and where.","/img/blog/ai-agent-secrets-auto-purge-default.jpg",[33,469,471],{"id":470},"the-attack-that-credentials-enable-its-not-what-you-think","The attack that credentials enable (it's not what you think)",[14,473,474],{},"Here's where most people get it wrong.",[14,476,477],{},"The primary risk isn't someone stealing your Anthropic API key and running up a bill. That's bad but recoverable. You rotate the key, dispute the charges, and move on.",[14,479,480,481,484],{},"The real risk is ",[52,482,483],{},"lateral movement",". Your agent has credentials for 5-10 different services. Anthropic API. Gmail OAuth. Slack bot token. Telegram bot token. GitHub personal access token. A compromised credential for one service gives the attacker access to that service. Five compromised credentials give the attacker access to your email, your team's Slack workspace, your Telegram contacts, and your code repositories. Simultaneously.",[14,486,487],{},"The attack chain works like this:",[14,489,490,493],{},[52,491,492],{},"Step 1: Access the agent."," Through a malicious skill (1,400+ on ClawHub), a gateway vulnerability (138+ CVEs), or an exposed instance (500,000+ on the public internet).",[14,495,496,499,500,503],{},[52,497,498],{},"Step 2: Read the credential store."," The ",[161,501,502],{},".env"," file is plaintext. Reading it takes milliseconds. The skill or exploit now has every credential the agent uses.",[14,505,506,509],{},[52,507,508],{},"Step 3: Lateral movement."," Use the Slack token to read internal messages. Use the Gmail token to search email. Use the GitHub token to access private repositories. Use the Telegram token to impersonate the user. Each service trusts the token. The access looks legitimate.",[14,511,512,515],{},[52,513,514],{},"Step 4: Persistence."," Create new API keys or OAuth tokens using the stolen credentials. Even if the user rotates the original credentials, the attacker has created new ones that remain valid.",[14,517,518],{},"This is exactly what Jamieson O'Reilly demonstrated. And SecurityScorecard found that 33.8% of exposed OpenClaw infrastructure correlates with known threat actor activity, including Kimsuky and APT28 groups. Nation-state actors are already looking at these credential stores.",[14,520,521],{},"The credential exposure window is the single most dangerous aspect of AI agent security. A patched CVE stops one exploit. Plaintext credentials sitting for months enable every exploit that achieves file system access.",[14,523,524],{},[40,525],{"alt":526,"src":527},"The real risk is not a higher API bill. It is lateral movement across five services simultaneously.","/img/blog/ai-agent-secrets-auto-purge-lateral-movement.jpg",[33,529,531],{"id":530},"what-secrets-auto-purge-actually-does-the-5-minute-ttl","What secrets auto-purge actually does (the 5-minute TTL)",[14,533,534],{},"Secrets auto-purge is the architecture we built to eliminate the credential exposure window.",[14,536,537],{},"Here's how it works:",[14,539,540],{},"When your agent needs a credential (API key, OAuth token, bot token), the platform retrieves it from an encrypted vault, provides it to the agent for the specific task, and starts a 5-minute countdown. After 5 minutes, the credential is purged from the agent's memory. Not overwritten. Not marked as expired. Purged. It's gone.",[14,542,543],{},"If a malicious skill reads the agent's memory after the purge, it finds nothing. If a CVE grants file system access after the purge, there are no credentials to steal. If the agent's container is compromised after the purge, the attacker gets conversation history but no keys to other services.",[14,545,546],{},"The 5-minute window exists because tasks take time. A Gmail search might take 30 seconds. A multi-step workflow with API calls might take 2-3 minutes. 5 minutes provides enough time for the agent to complete any reasonable task using the credential while minimizing the exposure window.",[14,548,549],{},[40,550],{"alt":551,"src":552},"Secrets auto-purge: how the 5-minute TTL eliminates the exposure window.","/img/blog/ai-agent-secrets-auto-purge-ttl.jpg",[33,554,556],{"id":555},"why-5-minutes-and-not-30-seconds-the-design-trade-off","Why 5 minutes and not 30 seconds (the design trade-off)",[14,558,559],{},"We tested shorter windows. 30 seconds was too aggressive. Multi-step workflows (search Gmail, compose response, send via Slack) sometimes chain three API calls across different services. At 30 seconds, the credential for the second service would purge before the agent finished using the first service's results to formulate the second request.",[14,561,562],{},"5 minutes covers 99%+ of single-task workflows while reducing the exposure window from \"forever\" (OpenClaw default) to a controlled interval. The math: if an agent uses credentials for 3 tasks per day at 5 minutes each, the total daily exposure is 15 minutes. On OpenClaw, the same credentials are exposed for 1,440 minutes (24 hours). That's a 96% reduction in attack surface.",[564,565,566,585],"table",{},[567,568,569],"thead",{},[570,571,572,576,579,582],"tr",{},[573,574,575],"th",{},"Platform",[573,577,578],{},"Credential Storage",[573,580,581],{},"Exposure Window",[573,583,584],{},"Daily Exposure (3 tasks)",[586,587,588,605,620],"tbody",{},[570,589,590,594,599,602],{},[591,592,593],"td",{},"OpenClaw default",[591,595,596,597],{},"Plaintext ",[161,598,502],{},[591,600,601],{},"Forever",[591,603,604],{},"1,440 min (24h)",[570,606,607,610,614,617],{},[591,608,609],{},"OpenClaw + manual rotation",[591,611,596,612],{},[161,613,502],{},[591,615,616],{},"Until next rotation",[591,618,619],{},"~hundreds of min",[570,621,622,625,628,631],{},[591,623,624],{},"BetterClaw auto-purge",[591,626,627],{},"AES-256 vault + 5-min TTL",[591,629,630],{},"5 min per use",[591,632,633],{},"15 min",[14,635,636,637,641],{},"For enterprise deployments where the credential vault architecture matters for compliance, our ",[79,638,640],{"href":639},"/skills/security-vetting","security vetting documentation"," covers how skill permissions interact with the credential system.",[33,643,645],{"id":644},"what-secrets-auto-purge-doesnt-solve-honest-limitations","What secrets auto-purge doesn't solve (honest limitations)",[14,647,648],{},"Here's the honest take on what auto-purge does and doesn't cover.",[14,650,651,654],{},[52,652,653],{},"It doesn't protect credentials during the 5-minute window."," If a malicious skill reads credentials within the first 5 minutes of a task, the credentials are still exposed. Auto-purge reduces the window from \"forever\" to \"5 minutes.\" It doesn't eliminate it entirely. That's why we combine auto-purge with verified skills (to prevent malicious skills from being installed in the first place) and Docker-sandboxed execution (to prevent skills from accessing the credential store directly).",[14,656,657,660],{},[52,658,659],{},"It doesn't protect credentials at the provider level."," If someone steals your Anthropic API key during the 5-minute window and creates new keys using it, those new keys persist at Anthropic regardless of what happens on the agent. Auto-purge reduces the probability of theft. Provider-side key rotation and monitoring are still necessary.",[14,662,663,666],{},[52,664,665],{},"It doesn't protect conversation history."," Credentials purge. Conversation content persists (it has to, for the agent's memory to work). If your conversations contain sensitive information, that information remains in the agent's memory. Auto-purge is specifically about credentials, not about all sensitive data.",[14,668,669,670,674],{},"If protecting credentials, vetting skills, and sandboxing execution sounds like the security architecture your team needs but doesn't want to build from scratch, ",[79,671,673],{"href":672},"/openclaw-alternative","BetterClaw includes all three layers",". Secrets auto-purge. Verified skills marketplace. Docker-sandboxed execution. AES-256 encryption at rest. Workspace isolation. Free tier with 1 agent and BYOK. $19/month per agent for Pro. Enterprise from $499/month with SAML SSO and audit logs.",[14,676,677],{},[40,678],{"alt":679,"src":680},"The honest limitations: auto-purge is one layer, not the whole solution.","/img/blog/ai-agent-secrets-auto-purge-limitations.jpg",[33,682,684],{"id":683},"why-nobody-else-is-doing-this-the-uncomfortable-reason","Why nobody else is doing this (the uncomfortable reason)",[14,686,687],{},"Here's what nobody tells you about AI agent security.",[14,689,690],{},"Secrets auto-purge is architecturally simple but commercially inconvenient. Most agent platforms store credentials permanently because it's easier to build and easier to support. \"Enter your API key once and forget about it\" is a better user experience than \"your credential expired and needs to be retrieved from the vault.\" The security trade-off is invisible to the user until a breach happens.",[14,692,693],{},"We chose the harder UX because the alternative is indefensible. Microsoft's security blog explicitly warned against running OpenClaw on work machines, partly because of the credential storage model. Kaspersky documented that infostealers are already targeting these files. CrowdStrike's enterprise advisory flagged credential exposure as a primary risk.",[14,695,696],{},"Every AI agent platform will eventually implement some form of credential TTL. The question is whether they do it before or after a major breach forces them to. We chose before.",[14,698,699],{},"The broader lesson extends beyond AI agents. Any system that stores third-party credentials indefinitely is creating a compounding risk that grows every day. The longer the credential sits, the more opportunities an attacker has to reach it. Time-limited credentials aren't a new concept (JWT tokens expire, OAuth refresh tokens rotate, session cookies timeout). AI agents are the last category of software that still stores credentials like it's 2005.",[14,701,456,702,706],{},[79,703,705],{"href":704},"/blog/openclaw-security-checklist","complete security checklist for self-hosted OpenClaw deployments",", our checklist covers manual credential rotation as a partial mitigation for users who can't implement auto-purge.",[14,708,709,710,713],{},"If you want secrets auto-purge, verified skills, and sandboxed execution without building the architecture yourself, ",[79,711,315],{"href":312,"rel":712},[314],". Free tier with 1 agent and BYOK. $19/month per agent for Pro. The credentials purge automatically. The skills are pre-vetted. The execution is sandboxed. The security isn't a configuration you maintain. It's a foundation you stand on.",[14,715,716],{},[40,717],{"alt":718,"src":719},"Secrets auto-purge is architecturally simple but commercially inconvenient. Here is why nobody does it.","/img/blog/ai-agent-secrets-auto-purge-tradeoff.jpg",[33,721,320],{"id":319},[14,723,724],{},[52,725,726],{},"What is secrets auto-purge in AI agents?",[14,728,729],{},"Secrets auto-purge is a security architecture where credentials (API keys, OAuth tokens, bot tokens) are automatically erased from an AI agent's memory after a fixed time window, typically 5 minutes. The agent retrieves credentials from an encrypted vault when needed, uses them for the task, and the credentials are purged after the TTL expires. This reduces the credential exposure window from \"forever\" (OpenClaw default) to minutes.",[14,731,732],{},[52,733,734],{},"Why does OpenClaw store API keys in plaintext?",[14,736,737,738,740],{},"OpenClaw stores credentials in ",[161,739,446],{}," as plaintext JSON files. This was a design choice prioritizing simplicity over security. Kaspersky confirmed this in their audit, noting that configuration, memory, and chat logs store API keys and passwords in plain text. RedLine and Lumma infostealers have already added OpenClaw file paths to their must-steal lists. Microsoft's security blog recommended against running OpenClaw on personal or corporate machines partly because of this.",[14,742,743],{},[52,744,745],{},"How does secrets auto-purge protect against credential theft?",[14,747,748],{},"Auto-purge reduces the attack window from permanent to 5 minutes. If an agent uses credentials for 3 tasks per day at 5 minutes each, total daily exposure is 15 minutes versus 1,440 minutes (24 hours) on OpenClaw. A malicious skill or vulnerability that accesses the agent's memory after the purge window finds no credentials. Combined with verified skills and Docker sandboxing, this addresses the full attack chain from access to exfiltration.",[14,750,751],{},[52,752,753],{},"Is 5 minutes enough time for AI agent tasks?",[14,755,756],{},"Yes. 99%+ of single-task workflows (API calls, email searches, message sends, data lookups) complete within 2-3 minutes. The 5-minute TTL provides buffer for multi-step workflows that chain several API calls. Shorter windows (30 seconds) were tested but caused failures in legitimate multi-service workflows. 5 minutes balances security (96% reduction in exposure) with functionality.",[14,758,759],{},[52,760,761],{},"Does BetterClaw encrypt stored credentials?",[14,763,764],{},"Yes. Credentials are stored in an encrypted vault using AES-256 encryption, not in plaintext files. They're retrieved from the vault only when needed for a specific task, provided to the agent in memory, and purged after 5 minutes. Even at rest in the vault, credentials are encrypted. This is layered with Docker-sandboxed execution (skills can't access the vault directly) and verified skills (malicious skills aren't installed in the first place).",{"title":372,"searchDepth":373,"depth":373,"links":766},[767,768,769,770,771,772,773],{"id":436,"depth":373,"text":437},{"id":470,"depth":373,"text":471},{"id":530,"depth":373,"text":531},{"id":555,"depth":373,"text":556},{"id":644,"depth":373,"text":645},{"id":683,"depth":373,"text":684},{"id":319,"depth":373,"text":320},"2026-04-30","OpenClaw stores API keys in plaintext forever. A 5-minute auto-purge reduces exposure by 96%. Here's the attack it prevents and the architecture behind it.","/img/blog/ai-agent-secrets-auto-purge.jpg",{},"/blog/ai-agent-secrets-auto-purge","7 min read",{"title":418,"description":775},"Secrets Auto-Purge: AI Agent Security for API Keys","blog/ai-agent-secrets-auto-purge",[784,785,786,787,788,789,790,791,792,793],"AI agent security","secrets auto-purge","API key security AI agent","OpenClaw plaintext credentials","credential TTL","AI agent credential exposure","agent memory security","OpenClaw security","BetterClaw security","AES-256 encryption","GRtPlaSa56wZMFFL5azk66a9YNG2pTFTxHAYQsZkW8U",{"id":796,"title":797,"author":798,"body":799,"category":392,"date":1163,"description":1164,"extension":395,"featured":396,"image":1165,"imageHeight":398,"imageWidth":398,"meta":1166,"navigation":400,"path":1167,"readingTime":1168,"seo":1169,"seoTitle":1170,"stem":1171,"tags":1172,"updatedDate":1163,"__hash__":1179},"blog/blog/anthropic-ai-bank-cyber-risk.md","Anthropic's Mythos Just Got Bank CEOs Summoned to Washington. Here's What It Means for Your AI Agents.",{"name":7,"role":8,"avatar":9},{"type":11,"value":800,"toc":1151},[801,807,810,813,816,819,822,826,829,832,835,838,844,848,851,854,857,860,863,866,870,873,876,883,886,892,895,901,905,907,910,913,916,919,927,940,944,947,950,953,956,964,970,974,977,980,983,986,992,996,999,1005,1011,1022,1028,1034,1038,1041,1044,1047,1062,1065,1067,1072,1075,1080,1083,1088,1094,1099,1102,1107,1110,1114],[14,802,803],{},[804,805,806],"em",{},"The collision of frontier AI models and financial infrastructure is rewriting the rules of cyber risk. If you're running AI agents, you're already in the blast radius.",[14,808,809],{},"Treasury Secretary Scott Bessent and Fed Chair Jerome Powell pulled bank CEOs into an emergency meeting this week. Not about interest rates. Not about a liquidity crisis.",[14,811,812],{},"About an AI model.",[14,814,815],{},"Anthropic's Claude Mythos, a frontier model so capable at finding software vulnerabilities that the company warned its own government contacts it would make large-scale cyberattacks \"much more likely in 2026.\" The model identified thousands of zero-day vulnerabilities in its first weeks of testing, many of them one to two decades old, hiding in the software that runs everything from hospital networks to trading floors.",[14,817,818],{},"If you're building or deploying AI agents right now, this isn't some abstract policy story. This is the environment your agents are operating in.",[14,820,821],{},"And it's about to get a lot more hostile.",[33,823,825],{"id":824},"the-moment-ai-cyber-risk-stopped-being-theoretical","The moment AI cyber risk stopped being theoretical",[14,827,828],{},"Let's rewind to September 2025. Anthropic detected what analysts now call the first fully autonomous AI espionage campaign at scale. A Chinese state-sponsored group used agentic AI capabilities to conduct vulnerability discovery, lateral movement, and payload execution with minimal human oversight.",[14,830,831],{},"Read that again. Minimal human oversight. An AI agent, not a team of hackers, ran the operation.",[14,833,834],{},"Then in January 2026, a Russian-speaking cybercriminal with limited technical skills used Claude and DeepSeek to hack over 600 devices across 55 countries. According to AWS's security research team, the attacker used generative AI to scale well-known attack techniques throughout every phase of their operation. At one point, the attacker asked Claude in Russian to build a web panel for managing hundreds of targets.",[14,836,837],{},"This is the new baseline. Not nation-state hackers with decades of training. Script kiddies with API keys.",[14,839,840],{},[40,841],{"alt":842,"src":843},"Timeline of AI-powered cyber attacks from September 2025 autonomous espionage to January 2026 mass exploitation","/img/blog/anthropic-ai-bank-cyber-risk-timeline.jpg",[33,845,847],{"id":846},"why-mythos-changes-the-math-for-everyone","Why Mythos changes the math for everyone",[14,849,850],{},"Here's the part that should make you uncomfortable.",[14,852,853],{},"Current AI models can identify high-severity vulnerabilities. Mythos can find five separate vulnerabilities in a single piece of software and chain them together into a novel attack that no human security team would have anticipated. Coupled with the ability to work unsupervised for extended periods, Anthropic says we've hit an inflection point.",[14,855,856],{},"Shlomo Kramer, founder and CEO of Cato Networks, put it bluntly: the agentic attackers are coming and this is a watershed event in the history of cybersecurity. Cisco's chief security officer Anthony Grieco said the old ways of hardening systems are no longer sufficient.",[14,858,859],{},"And here's what nobody tells you: the window is narrow. Alex Stamos, chief product officer at cybersecurity firm Corridor, estimates the open-source models will catch up to frontier model bug-finding capabilities within six months.",[14,861,862],{},"The attackers only need to find one way in. Defenders have to cover every surface.",[14,864,865],{},"That asymmetry has always existed in cybersecurity. AI just compressed the timeline from months to minutes.",[33,867,869],{"id":868},"what-this-means-if-youre-running-ai-agents","What this means if you're running AI agents",[14,871,872],{},"Stay with me here, because this is where it gets personal.",[14,874,875],{},"If you're self-hosting an OpenClaw agent on a VPS, a DigitalOcean droplet, or even a Mac Mini under your desk, your attack surface just expanded dramatically. Every exposed port, every unpatched dependency, every misconfigured Docker container is now a target that can be discovered and exploited at machine speed.",[14,877,878,879,882],{},"The ",[79,880,881],{"href":459},"OpenClaw security risks"," we've been writing about for months aren't hypothetical anymore. They're the exact kind of vulnerabilities that Mythos-class models will find and chain together.",[14,884,885],{},"Think about what a typical self-hosted agent setup looks like:",[14,887,888,889,891],{},"Docker containers with default configurations. API keys stored in ",[161,890,502],{}," files. Ports exposed to the public internet. No intrusion detection. No automated patching. No audit logging.",[14,893,894],{},"That was \"good enough\" when the threat was a bored teenager with Metasploit. It is not good enough when the threat is an autonomous AI agent running 24/7 vulnerability scans.",[14,896,897],{},[40,898],{"alt":899,"src":900},"Self-hosted AI agent attack surface showing exposed ports, unpatched dependencies, and plaintext credentials","/img/blog/anthropic-ai-bank-cyber-risk-attack-surface.jpg",[33,902,904],{"id":903},"the-infrastructure-gap-most-agent-builders-ignore","The infrastructure gap most agent builders ignore",[14,906,474],{},[14,908,909],{},"They think security is something you bolt on after your agent works. First get the YAML right. First get the skills installed. First get the model routing figured out. Security can wait.",[14,911,912],{},"It can't wait anymore.",[14,914,915],{},"Anthropic launched Project Glasswing alongside Mythos, giving 12 partner organizations including Microsoft, Apple, and Cisco early access to find and fix vulnerabilities before they get exploited. That tells you something about the urgency.",[14,917,918],{},"But most teams running AI agents aren't Microsoft. They don't have a dedicated security team scanning their infrastructure. They're a founder, a small dev team, maybe a contractor. They're choosing between building features and patching CVEs.",[14,920,921,922,926],{},"If you've been wrestling with ",[79,923,925],{"href":924},"/blog/openclaw-docker-troubleshooting","OpenClaw Docker troubleshooting"," or spending weekends maintaining your agent infrastructure, this is the moment to ask yourself: is that really how you want to spend your time in a world where AI-powered attacks operate at machine speed?",[14,928,929,930,934,935,939],{},"We built ",[79,931,933],{"href":932},"/","Better Claw"," because we were tired of infrastructure eating our weekends. But in light of what Anthropic just disclosed, managed hosting isn't just about convenience anymore. It's about not being the low-hanging fruit in an environment where autonomous attackers are scanning for exactly that. ",[79,936,938],{"href":937},"/pricing","$19/month per agent",", and your infrastructure is somebody else's problem.",[33,941,943],{"id":942},"what-the-bessent-powell-meeting-actually-signals","What the Bessent-Powell meeting actually signals",[14,945,946],{},"And that's when we realized this story isn't really about banks.",[14,948,949],{},"Yes, Bessent and Powell summoned Wall Street CEOs to make sure financial institutions are preparing defenses against Mythos-class threats. But the real signal is simpler: the US government now considers AI-generated cyber risk a systemic threat.",[14,951,952],{},"Not a \"keep an eye on it\" threat. A \"clear your calendar and come to Washington\" threat.",[14,954,955],{},"The implications cascade downward. If banks need to harden their systems, every vendor and partner in their supply chain needs to do the same. If you're building an AI agent that touches financial data, customer PII, or payment systems, the security bar just jumped by an order of magnitude.",[14,957,958,959,963],{},"This is especially relevant if you're running agents for ",[79,960,962],{"href":961},"/blog/openclaw-agents-for-ecommerce","ecommerce use cases"," or anything that handles customer data. The regulatory scrutiny that follows a story like this always trickles down.",[14,965,966],{},[40,967],{"alt":968,"src":969},"Cascade of AI cyber risk regulations from government to banks to vendors to AI agent builders","/img/blog/anthropic-ai-bank-cyber-risk-cascade.jpg",[33,971,973],{"id":972},"the-arms-race-youre-already-part-of","The arms race you're already part of",[14,975,976],{},"But that's not even the real problem.",[14,978,979],{},"Every major AI lab's next model will push cyber capabilities further. Behind Mythos is the next OpenAI model, and the next Gemini, and a few months behind them are the open-source Chinese models. As Kramer told CNN, the defenders need to run as fast as they can just to stay in the same place.",[14,981,982],{},"This creates a permanent tax on every team running AI infrastructure. You need automated patching. You need encrypted secrets management. You need isolated execution environments. You need audit logs. You need somebody watching the monitors at 3 AM when a Mythos-inspired scanner finds a forgotten port.",[14,984,985],{},"Or you need to outsource that entire burden.",[14,987,878,988,991],{},[79,989,990],{"href":704},"OpenClaw security checklist"," we published is a good starting point if you're committed to self-hosting. But be honest with yourself about whether you can maintain that posture indefinitely against adversaries that don't sleep, don't get bored, and don't make typos.",[33,993,995],{"id":994},"what-to-actually-do-right-now","What to actually do right now",[14,997,998],{},"Let me be practical. Here's what matters this week, not this quarter.",[14,1000,1001,1004],{},[52,1002,1003],{},"Audit your exposed surfaces."," If your agent is reachable from the public internet, assume it will be scanned by something smarter than you within days. Check every open port. Check your Docker configs. Check where your API keys live.",[14,1006,1007,1010],{},[52,1008,1009],{},"Update everything."," Mythos found vulnerabilities that were one to two decades old. The boring stuff matters more than ever.",[14,1012,1013,1016,1017,1021],{},[52,1014,1015],{},"Evaluate your hosting model."," Self-hosting made sense when the primary risk was downtime. The risk profile has changed. Consider whether ",[79,1018,1020],{"href":1019},"/openclaw-hosting","managed OpenClaw hosting"," is worth the tradeoff.",[14,1023,1024,1027],{},[52,1025,1026],{},"Watch the regulatory signals."," The Bessent-Powell meeting is the first domino. If you're building agents for regulated industries, expect compliance requirements to tighten fast.",[14,1029,1030,1033],{},[52,1031,1032],{},"Don't panic, but don't ignore this."," The fact that Anthropic launched Project Glasswing means the industry is taking this seriously. The worst response is to assume you're too small to be a target. Automated attacks don't discriminate by company size.",[33,1035,1037],{"id":1036},"the-honest-takeaway","The honest takeaway",[14,1039,1040],{},"Here's what I keep coming back to.",[14,1042,1043],{},"We got into AI agents because the technology is genuinely exciting. Watching an agent autonomously handle tasks that used to take hours of manual work is one of the best feelings in tech right now. That hasn't changed.",[14,1045,1046],{},"What's changed is the environment. The same agentic capabilities that make our tools powerful also make the threats against our infrastructure more capable. That's not a reason to stop building. It's a reason to build on foundations that can withstand what's coming.",[14,1048,1049,1050,1052,1053,1057,1058,1061],{},"If any of this hit close to home, if you've been running a self-hosted agent and putting off the security hardening, if you know your ",[161,1051,502],{}," file is doing more heavy lifting than it should, ",[79,1054,1056],{"href":312,"rel":1055},[314],"give Better Claw a look",". It's $19/month per agent, BYOK, and you get managed infrastructure with security that doesn't depend on you remembering to run ",[161,1059,1060],{},"apt update"," at midnight. We handle the infrastructure. You handle the interesting part.",[14,1063,1064],{},"The agentic attackers are coming. Make sure your agents are ready.",[33,1066,320],{"id":319},[14,1068,1069],{},[52,1070,1071],{},"What is the Anthropic Mythos AI model and why does it matter for cyber risk?",[14,1073,1074],{},"Claude Mythos is Anthropic's most powerful AI model to date, sitting above its Opus tier. It matters because it can autonomously discover, chain together, and exploit software vulnerabilities at speeds no human team can match. In its first weeks of testing, it found thousands of zero-day flaws, many hidden for over a decade.",[14,1076,1077],{},[52,1078,1079],{},"How does AI-driven cyber risk affect banks and financial services?",[14,1081,1082],{},"Treasury Secretary Bessent and Fed Chair Powell summoned bank CEOs specifically over Mythos-class threats, signaling the government views AI cyber risk as systemic to financial stability. Banks face pressure to harden systems across their entire supply chain, which cascades to every vendor and partner handling financial data.",[14,1084,1085],{},[52,1086,1087],{},"How do I secure my self-hosted AI agent against AI-powered attacks?",[14,1089,1090,1091,1093],{},"Start by auditing exposed ports, moving secrets out of ",[161,1092,502],{}," files into encrypted vaults, keeping all dependencies patched, and enabling audit logging. If maintaining that security posture continuously isn't realistic for your team, evaluate managed hosting options that handle infrastructure security for you.",[14,1095,1096],{},[52,1097,1098],{},"Is managed AI agent hosting worth the cost for security alone?",[14,1100,1101],{},"At $19/month per agent, managed hosting like BetterClaw costs less than a single hour of incident response consulting. You get isolated environments, automated updates, encrypted secrets management, and monitoring without needing to maintain it yourself. In a world of autonomous AI-powered scanning, the cost of a breach far exceeds the cost of prevention.",[14,1103,1104],{},[52,1105,1106],{},"Is my small project really a target for AI-powered cyberattacks?",[14,1108,1109],{},"Yes. Automated scanning tools, including the techniques Mythos enables, don't discriminate by company size. In January 2026, a single attacker with limited skills used AI to compromise 600+ devices across 55 countries. If your agent is reachable from the internet, it's a target regardless of how small your operation is.",[33,1111,1113],{"id":1112},"related-reading","Related Reading",[1115,1116,1117,1124,1130,1137,1144],"ul",{},[1118,1119,1120,1123],"li",{},[79,1121,1122],{"href":459},"OpenClaw Security Risks Explained"," — The specific vulnerabilities AI attackers will target",[1118,1125,1126,1129],{},[79,1127,1128],{"href":704},"OpenClaw Security Checklist"," — Hardening steps if you're committed to self-hosting",[1118,1131,1132,1136],{},[79,1133,1135],{"href":1134},"/blog/openclaw-gateway-guide","OpenClaw Gateway Guide"," — The single setting that exposed 30,000+ instances",[1118,1138,1139,1143],{},[79,1140,1142],{"href":1141},"/blog/openclaw-skill-audit","OpenClaw Skill Audit"," — How to check for compromised skills in your setup",[1118,1145,1146,1150],{},[79,1147,1149],{"href":1148},"/compare/openclaw","BetterClaw vs Self-Hosted OpenClaw"," — Managed security vs DIY in the new threat landscape",{"title":372,"searchDepth":373,"depth":373,"links":1152},[1153,1154,1155,1156,1157,1158,1159,1160,1161,1162],{"id":824,"depth":373,"text":825},{"id":846,"depth":373,"text":847},{"id":868,"depth":373,"text":869},{"id":903,"depth":373,"text":904},{"id":942,"depth":373,"text":943},{"id":972,"depth":373,"text":973},{"id":994,"depth":373,"text":995},{"id":1036,"depth":373,"text":1037},{"id":319,"depth":373,"text":320},{"id":1112,"depth":373,"text":1113},"2026-04-10","Anthropic's Mythos model triggered an emergency bank CEO meeting. Learn what AI-driven cyber risk means for your AI agents and how to protect them.","/img/blog/anthropic-ai-bank-cyber-risk.jpg",{},"/blog/anthropic-ai-bank-cyber-risk","10 min read",{"title":797,"description":1164},"Anthropic AI Cyber Risk: What Bank CEO Warnings Mean for Agents","blog/anthropic-ai-bank-cyber-risk",[1173,1174,1175,1176,1177,1178],"anthropic ai cyber risk","mythos ai model security","ai agent security","openclaw security","ai cybersecurity threats","managed ai agent hosting","abtd9SFcnUzwrrV244DKKIdQ2617mNqBFS6kn58IlZc",{"id":1181,"title":1182,"author":1183,"body":1184,"category":392,"date":1698,"description":1699,"extension":395,"featured":396,"image":1700,"imageHeight":398,"imageWidth":398,"meta":1701,"navigation":400,"path":1702,"readingTime":1703,"seo":1704,"seoTitle":1705,"stem":1706,"tags":1707,"updatedDate":1698,"__hash__":1715},"blog/blog/clawhub-skills-directory.md","ClawHub Skills Directory - The Complete 2026 Guide to Finding, Vetting, and Using OpenClaw Skills",{"name":7,"role":8,"avatar":9},{"type":11,"value":1185,"toc":1671},[1186,1191,1194,1197,1204,1207,1211,1214,1217,1220,1226,1232,1239,1243,1246,1250,1253,1259,1263,1266,1272,1276,1279,1285,1289,1292,1298,1304,1308,1311,1315,1318,1321,1327,1331,1334,1340,1344,1347,1353,1359,1371,1375,1378,1384,1390,1396,1402,1408,1414,1417,1421,1424,1428,1434,1440,1446,1450,1456,1462,1468,1474,1481,1485,1488,1492,1495,1499,1502,1505,1513,1519,1523,1526,1532,1538,1544,1554,1560,1566,1570,1573,1579,1585,1591,1597,1603,1609,1613,1616,1619,1622,1629,1631,1636,1639,1644,1647,1652,1655,1660,1663,1668],[14,1187,1188],{},[52,1189,1190],{},"13,700+ skills. 824 were malicious. Here's how to navigate the marketplace without becoming a statistic.",[14,1192,1193],{},"I found the perfect Notion integration skill on ClawHub last month. Clean description. Recent updates. 3,200+ downloads. I installed it, connected my workspace, and watched my OpenClaw agent sync tasks from Telegram directly into Notion boards.",[14,1195,1196],{},"Two days later, I noticed API requests on my Anthropic dashboard that I hadn't made. Someone was using my key. The skill had been reading my config file and sending credentials to an external server while functioning exactly as advertised.",[14,1198,1199,1200,1203],{},"That skill was part of the ClawHavoc campaign. ",[52,1201,1202],{},"824 malicious skills discovered on ClawHub, roughly 20% of the entire registry."," One compromised package had 14,285 downloads before it was pulled. ClawHub responded by purging 2,419 suspicious packages and partnering with VirusTotal for automated scanning.",[14,1205,1206],{},"This guide covers everything you need to know about the ClawHub skills directory in 2026: what's available, what's dangerous, how to find good skills, and how to protect yourself from bad ones.",[33,1208,1210],{"id":1209},"what-clawhub-actually-is-and-isnt","What ClawHub actually is (and isn't)",[14,1212,1213],{},"ClawHub is the official skill registry for OpenClaw. Think of it like npm for Node.js packages or PyPI for Python libraries, except the packages add capabilities to your AI agent instead of your codebase.",[14,1215,1216],{},"Skills are what turn OpenClaw from a chatbot into an agent. Without skills, your agent can only have conversations. With skills, it can search the web, manage your calendar, read and write files, automate browser tasks, send emails, interact with APIs, and execute shell commands.",[14,1218,1219],{},"As of March 2026, ClawHub hosts over 13,700 skills. A separate community-curated registry (awesome-openclaw-skills on GitHub) tracks another 5,400+ skills that have been independently reviewed. The ecosystem is massive and growing fast, driven by OpenClaw's 1.27 million weekly npm downloads.",[14,1221,1222,1225],{},[52,1223,1224],{},"What ClawHub is:"," An open registry where anyone can publish a skill package. Think app store with minimal review.",[14,1227,1228,1231],{},[52,1229,1230],{},"What ClawHub isn't:"," A curated, security-reviewed marketplace. Until the VirusTotal partnership, there was effectively no automated security scanning. Publishers could upload anything. And 20% of them uploaded something malicious.",[14,1233,1234,1235,1238],{},"For the full timeline of ",[79,1236,1237],{"href":459},"documented OpenClaw security incidents"," including the ClawHavoc campaign, CrowdStrike advisory, and Cisco's data exfiltration discovery, our security guide covers each event.",[33,1240,1242],{"id":1241},"the-clawhub-skills-categories-worth-knowing","The ClawHub skills categories worth knowing",[14,1244,1245],{},"The directory organizes skills into categories, though the boundaries are loose and many skills span multiple categories. Here's what's available and what's genuinely useful.",[45,1247,1249],{"id":1248},"communication-skills","Communication skills",[14,1251,1252],{},"These connect your agent to external messaging and communication tools. Email reading and drafting (Gmail, Outlook), calendar management (Google Calendar, CalDAV), messaging integrations beyond the platforms OpenClaw already supports natively, and notification routing.",[14,1254,1255,1258],{},[52,1256,1257],{},"The risk level is high."," Communication skills need access to your email, calendar, or messaging accounts. A compromised email skill can read every message in your inbox and forward copies to an external server. The Meta researcher Summer Yue incident is the cautionary tale here: her agent mass-deleted emails while ignoring stop commands. Even legitimate email skills need strict permission boundaries.",[45,1260,1262],{"id":1261},"search-and-research-skills","Search and research skills",[14,1264,1265],{},"Web search (Brave API, Google Custom Search, Tavily), academic paper search, news aggregation, and data retrieval from specific sources. These are among the most commonly installed skills because they give your agent access to real-time information.",[14,1267,1268,1271],{},[52,1269,1270],{},"The risk level is moderate."," Search skills make outbound API calls to retrieve information. The main concern is whether they're sending your query data (which might contain sensitive context from your conversations) to unexpected destinations alongside the legitimate search requests.",[45,1273,1275],{"id":1274},"productivity-skills","Productivity skills",[14,1277,1278],{},"File management, note-taking integrations (Notion, Obsidian), project management connections (Linear, Asana, Jira), and document processing. These skills let your agent interact with your work tools.",[14,1280,1281,1284],{},[52,1282,1283],{},"The risk level is moderate to high."," Productivity skills typically need OAuth tokens or API keys for external services. A compromised productivity skill has access to whatever tools it connects to.",[45,1286,1288],{"id":1287},"developer-tools","Developer tools",[14,1290,1291],{},"Code execution, Git operations, CI/CD integrations, database queries, and API testing. These are popular among developers who use OpenClaw as a coding assistant.",[14,1293,1294,1297],{},[52,1295,1296],{},"The risk level is very high."," Developer tool skills often have shell access or can execute arbitrary code. A malicious developer skill with shell access can do anything on your machine. Cisco's discovery of a skill performing data exfiltration was in this category.",[14,1299,1300],{},[40,1301],{"alt":1302,"src":1303},"ClawHub skills categories organized by risk level","/img/blog/clawhub-skills-directory-categories.jpg",[33,1305,1307],{"id":1306},"how-to-find-good-skills-on-clawhub","How to find good skills on ClawHub",[14,1309,1310],{},"The ClawHub interface shows skill name, description, publisher, download count, last update date, and version history. Here's how to use that information to filter for quality.",[45,1312,1314],{"id":1313},"publisher-reputation-matters-most","Publisher reputation matters most",[14,1316,1317],{},"The OpenClaw core team maintains a set of official skills. These are the safest options because they're maintained by the same developers who build the framework. Look for the official organization badge.",[14,1319,1320],{},"After official skills, established community developers with multiple published packages, active GitHub profiles, and real identities are the next safest tier. A publisher who has maintained three skills for six months with regular updates is very different from an account created last week with one package.",[14,1322,1323,1326],{},[52,1324,1325],{},"Red flags on publishers:"," Account created recently with only one skill. Username that mimics official accounts (like \"opencIaw\" with a capital I instead of lowercase L). No GitHub profile linked. Generic or AI-generated skill descriptions.",[45,1328,1330],{"id":1329},"download-count-needs-context","Download count needs context",[14,1332,1333],{},"High download count alone doesn't mean safe. The most-downloaded malicious skill in the ClawHavoc campaign had 14,285 downloads before removal. Download count tells you popularity, not quality.",[14,1335,1336,1339],{},[52,1337,1338],{},"What matters more:"," the ratio of downloads to the skill's age. A skill published last week with 5,000 downloads either went viral organically (rare) or had its count artificially boosted (more common). A skill published six months ago with 5,000 downloads grew naturally through genuine adoption.",[45,1341,1343],{"id":1342},"last-update-date-signals-maintenance","Last update date signals maintenance",[14,1345,1346],{},"Skills that haven't been updated in more than three months are concerning. OpenClaw releases multiple updates per week. Skills that don't keep up with the framework eventually break or develop compatibility issues.",[14,1348,1349,1352],{},[52,1350,1351],{},"The sweet spot:"," skills updated within the last 30-60 days with a consistent version history showing incremental improvements rather than a single large dump of code.",[14,1354,1355],{},[40,1356],{"alt":1357,"src":1358},"How to evaluate ClawHub skill listings","/img/blog/clawhub-skills-directory-evaluation.jpg",[14,1360,1361,1362,1366,1367,1370],{},"For our curated list of ",[79,1363,1365],{"href":1364},"/blog/best-openclaw-skills","the best community-vetted OpenClaw skills"," that have passed security review, our ",[79,1368,1369],{"href":1364},"skills guide"," ranks options by reliability, safety, and usefulness.",[33,1372,1374],{"id":1373},"the-5-step-vetting-process-before-you-install-anything","The 5-step vetting process before you install anything",[14,1376,1377],{},"Finding a skill on ClawHub is step one. Vetting it before installation is what separates safe users from compromised ones.",[14,1379,1380,1383],{},[52,1381,1382],{},"Step 1: Check the publisher."," Verify their identity, account age, and other published packages. Official skills from the core team are safest.",[14,1385,1386,1389],{},[52,1387,1388],{},"Step 2: Read the source code."," Every ClawHub skill is JavaScript or TypeScript. You're looking for network calls to unexpected domains, file reads outside the skill's workspace (especially reads of your config file where API keys live), obfuscated or minified code (legitimate skills are readable), and environment variable access beyond what's needed.",[14,1391,1392,1395],{},[52,1393,1394],{},"Step 3: Search community reports."," Check GitHub issues and the OpenClaw Discord for the skill name. If others have reported problems, you'll find them.",[14,1397,1398,1401],{},[52,1399,1400],{},"Step 4: Test in a sandboxed workspace."," Never install a new skill directly into your production agent. Create a test workspace, install the skill there, run it for 24-48 hours, and monitor your API usage dashboards for unexpected activity.",[14,1403,1404,1407],{},[52,1405,1406],{},"Step 5: Set limits."," After installation, configure iteration limits and context token caps to contain the blast radius if a skill misbehaves.",[14,1409,1410],{},[40,1411],{"alt":1412,"src":1413},"5-step skill vetting process","/img/blog/clawhub-skills-directory-vetting.jpg",[14,1415,1416],{},"The vetting process takes 5-10 minutes per skill plus a 24-hour monitoring window. That's 5-10 minutes compared to hours of damage control if something goes wrong. The math is obvious.",[33,1418,1420],{"id":1419},"what-changed-after-clawhavoc","What changed after ClawHavoc",[14,1422,1423],{},"The ClawHavoc campaign was a wake-up call for the entire ecosystem. Here's what ClawHub has done since, and what's still missing.",[45,1425,1427],{"id":1426},"what-improved","What improved",[14,1429,1430,1433],{},[52,1431,1432],{},"VirusTotal partnership."," ClawHub now runs automated security scans on all new skill submissions. Known malware signatures and suspicious patterns trigger review before publication. This catches known attack patterns but not novel ones.",[14,1435,1436,1439],{},[52,1437,1438],{},"Mass purge."," 2,419 suspicious packages were removed from the registry. This cleaned up the worst offenders but happened after the damage was done. The most-downloaded malicious package had already been installed by thousands of users.",[14,1441,1442,1445],{},[52,1443,1444],{},"Publisher verification."," ClawHub introduced optional publisher verification. Verified publishers have confirmed identities. The problem: verification is optional, and most publishers haven't bothered.",[45,1447,1449],{"id":1448},"whats-still-missing","What's still missing",[14,1451,1452,1455],{},[52,1453,1454],{},"Mandatory code review."," There's no human review of skill code before publication. VirusTotal catches known malware patterns, but sophisticated exfiltration techniques (like the Cisco-discovered skill that looked perfectly legitimate) can slip through automated detection.",[14,1457,1458,1461],{},[52,1459,1460],{},"Permission scoping."," Skills currently have access to whatever OpenClaw has access to. There's no granular permission system where a calendar skill can only access calendar APIs, not your file system. This means every skill is either trusted with everything or not installed at all.",[14,1463,1464,1467],{},[52,1465,1466],{},"Dependency auditing."," Skills can include npm dependencies. Those dependencies can include their own dependencies. The supply chain attack surface extends well beyond the skill code itself.",[14,1469,1470],{},[40,1471],{"alt":1472,"src":1473},"ClawHub security improvements timeline","/img/blog/clawhub-skills-directory-security.jpg",[14,1475,1476,1477,1480],{},"If managing skill security, vetting, and permission boundaries sounds like more work than you want, ",[79,1478,1479],{"href":932},"BetterClaw's curated skill marketplace"," audits every skill before publication. Docker-sandboxed execution means even a compromised skill can't access your host system or credentials. $19/month per agent, BYOK. Zero unvetted code running on your infrastructure.",[33,1482,1484],{"id":1483},"the-alternative-registries-worth-knowing","The alternative registries worth knowing",[14,1486,1487],{},"ClawHub isn't the only place to find OpenClaw skills. Two alternatives are worth mentioning.",[45,1489,1491],{"id":1490},"awesome-openclaw-skills-github","awesome-openclaw-skills (GitHub)",[14,1493,1494],{},"A community-curated list tracking 5,400+ skills with basic quality annotations. It's not a registry (you still install skills from ClawHub or GitHub). It's a curation layer that filters the noise. The maintainers remove skills that are reported as malicious or abandoned. It's not a security guarantee, but it's a better starting point than browsing ClawHub's unfiltered listing.",[45,1496,1498],{"id":1497},"direct-github-installation","Direct GitHub installation",[14,1500,1501],{},"You can install skills directly from GitHub repositories without going through ClawHub at all. Clone the repo, review the code, and copy it into your OpenClaw skills directory. This bypasses ClawHub entirely and gives you complete visibility into what you're installing.",[14,1503,1504],{},"The trade-off: no auto-updates. When the skill author pushes a new version, you need to manually pull the changes. ClawHub-installed skills update automatically, which is both convenient and risky (an update could introduce new malicious code that wasn't in the version you vetted).",[14,1506,1507,1508,1512],{},"For guidance on ",[79,1509,1511],{"href":1510},"/blog/openclaw-setup-guide-complete","the full OpenClaw installation and skill configuration process",", our setup guide covers where skills fit into the deployment sequence.",[14,1514,1515],{},[40,1516],{"alt":1517,"src":1518},"Alternative OpenClaw skill registries comparison","/img/blog/clawhub-skills-directory-alternatives.jpg",[33,1520,1522],{"id":1521},"the-skills-most-people-should-start-with","The skills most people should start with",[14,1524,1525],{},"After reviewing the ecosystem extensively, here are the skill categories that provide the most value with the least risk for new OpenClaw users.",[14,1527,1528,1531],{},[52,1529,1530],{},"Web search."," The official web search skill or Brave Search API integration. Essential for any agent that needs to look up information. Maintained by the core team. Low risk because it only makes outbound search queries.",[14,1533,1534,1537],{},[52,1535,1536],{},"File operations."," OpenClaw's built-in file read/write capabilities handle most basic file tasks without requiring an external skill. Start with the native tools before adding third-party file management skills.",[14,1539,1540,1543],{},[52,1541,1542],{},"Calendar."," Google Calendar or CalDAV integrations from verified publishers with established track records. These need OAuth access to your calendar, so choose carefully. Only install from publishers with real identities.",[14,1545,1546,1549,1550,1553],{},[52,1547,1548],{},"Custom internal skills."," If you need your agent to interact with a proprietary API (your Shopify store, your CRM, your internal tools), building a custom skill is safer than finding a generic one on ClawHub. You control every line of code. For ecommerce-specific agent configurations, our ",[79,1551,1552],{"href":961},"ecommerce guide"," covers the most common integrations.",[14,1555,1556,1559],{},[52,1557,1558],{},"Email (with extreme caution)."," Email skills are the highest-risk category. Start with read-only access. Only enable send with explicit confirmation requirements. Never give an agent unsupervised email send permissions. The Summer Yue incident is the permanent reminder of why.",[14,1561,1562],{},[40,1563],{"alt":1564,"src":1565},"Recommended starter skills for OpenClaw","/img/blog/clawhub-skills-directory-starter.jpg",[33,1567,1569],{"id":1568},"what-to-do-if-youve-already-installed-unvetted-skills","What to do if you've already installed unvetted skills",[14,1571,1572],{},"If you've been installing ClawHub skills without vetting them (most people have in the beginning), here's the damage control sequence.",[14,1574,1575,1578],{},[52,1576,1577],{},"First: rotate all API keys immediately."," Every key in your OpenClaw config. Anthropic, OpenAI, Telegram bot tokens, OAuth credentials. All of them. If any skill has exfiltrated your keys, rotating them invalidates the stolen copies.",[14,1580,1581,1584],{},[52,1582,1583],{},"Second: review your API usage dashboards."," Check the last 30 days for requests you didn't make. Unusual patterns (requests at odd hours, high-volume calls you don't recognize) indicate compromise.",[14,1586,1587,1590],{},[52,1588,1589],{},"Third: audit every installed skill."," List everything your agent currently has installed. For each skill, run through the 5-step vetting process. Remove anything that doesn't pass.",[14,1592,1593,1596],{},[52,1594,1595],{},"Fourth: set up monitoring going forward."," Check API usage weekly. Review logs after installing any new skill. Set spending caps on all provider accounts.",[14,1598,1599],{},[40,1600],{"alt":1601,"src":1602},"Damage control steps for unvetted skills","/img/blog/clawhub-skills-directory-damage-control.jpg",[14,1604,878,1605,1608],{},[79,1606,1607],{"href":459},"managed vs self-hosted security comparison"," covers how platforms like BetterClaw handle skill security versus what you're responsible for when self-hosting.",[33,1610,1612],{"id":1611},"the-bigger-picture-where-the-clawhub-ecosystem-is-heading","The bigger picture: where the ClawHub ecosystem is heading",[14,1614,1615],{},"The skills ecosystem is at an inflection point. The ClawHavoc campaign forced the community to take supply chain security seriously. VirusTotal scanning and the publisher verification system are steps in the right direction. But the fundamental challenge remains: an open registry with minimal review will always have a security tail risk.",[14,1617,1618],{},"The likely evolution is a tiered system. A \"verified\" tier with mandatory code review and publisher identity verification. An \"unverified\" tier with automated scanning only. And eventually, permission scoping that limits what each skill can access regardless of trust level.",[14,1620,1621],{},"Until that happens, the responsibility is on you. Every skill you install is executable code running with your agent's permissions and access to your API keys. Treat ClawHub like you'd treat any package registry: with appreciation for the ecosystem and suspicion toward anything you haven't personally reviewed.",[14,1623,1624,1625,1628],{},"If you want a deployment where skills are security-audited before they reach your agent, where Docker sandboxing prevents compromised code from accessing your host system, and where you don't carry the vetting burden yourself, ",[79,1626,315],{"href":312,"rel":1627},[314],". $19/month per agent, BYOK. Every skill in our marketplace is reviewed. Sandboxed execution means even a problematic skill can't reach beyond its container. You build workflows. We handle the security.",[33,1630,320],{"id":319},[14,1632,1633],{},[52,1634,1635],{},"What is ClawHub?",[14,1637,1638],{},"ClawHub is the official skill registry for OpenClaw, hosting over 13,700 installable skill packages as of March 2026. Skills add capabilities to your OpenClaw agent: web search, calendar management, email, file operations, browser automation, and API integrations. ClawHub functions like npm or PyPI but for AI agent capabilities. Anyone can publish skills, and since the ClawHavoc cleanup, all submissions go through VirusTotal automated scanning.",[14,1640,1641],{},[52,1642,1643],{},"How does ClawHub compare to awesome-openclaw-skills?",[14,1645,1646],{},"ClawHub is the official registry with the largest collection (13,700+ skills) and auto-update support, but it's an open marketplace with minimal human review. awesome-openclaw-skills is a community-curated GitHub list tracking 5,400+ skills with basic quality filtering and maintainer oversight. Neither is a security guarantee. ClawHub has more skills and convenience. awesome-openclaw-skills has better curation. Use both as discovery tools, but always vet skills yourself before installation.",[14,1648,1649],{},[52,1650,1651],{},"How do I install skills from ClawHub safely?",[14,1653,1654],{},"Follow a 5-step process: check the publisher's identity and account history, read the source code for suspicious network calls and file access patterns, search community reports on GitHub and Discord, test in a sandboxed workspace for 24-48 hours while monitoring API usage, and set iteration limits and context caps after installation. The active vetting takes 5-10 minutes per skill plus a 24-hour monitoring window.",[14,1656,1657],{},[52,1658,1659],{},"How much do ClawHub skills cost to use?",[14,1661,1662],{},"Skills themselves are free to install from ClawHub. The cost comes from the API tokens they consume when your agent uses them. A web search skill adds roughly 1,000-3,000 tokens per search call. Browser automation can use 500-2,000 tokens per step. On Claude Sonnet ($3/$15 per million tokens), typical skill usage adds $5-20/month to your API bill depending on frequency. Set iteration limits to prevent runaway costs from skills that loop.",[14,1664,1665],{},[52,1666,1667],{},"Are ClawHub skills secure enough for business use?",[14,1669,1670],{},"Not without vetting. The ClawHavoc campaign found 824 malicious skills (roughly 20% of the registry). ClawHub has since purged 2,419 suspicious packages and added VirusTotal scanning, but automated detection doesn't catch everything. Cisco independently found a legitimate-looking skill performing data exfiltration. For business use, either vet every skill manually using the 5-step process, use a managed platform with a curated skill marketplace (like BetterClaw), or build custom skills for sensitive integrations.",{"title":372,"searchDepth":373,"depth":373,"links":1672},[1673,1674,1680,1685,1686,1690,1694,1695,1696,1697],{"id":1209,"depth":373,"text":1210},{"id":1241,"depth":373,"text":1242,"children":1675},[1676,1677,1678,1679],{"id":1248,"depth":378,"text":1249},{"id":1261,"depth":378,"text":1262},{"id":1274,"depth":378,"text":1275},{"id":1287,"depth":378,"text":1288},{"id":1306,"depth":373,"text":1307,"children":1681},[1682,1683,1684],{"id":1313,"depth":378,"text":1314},{"id":1329,"depth":378,"text":1330},{"id":1342,"depth":378,"text":1343},{"id":1373,"depth":373,"text":1374},{"id":1419,"depth":373,"text":1420,"children":1687},[1688,1689],{"id":1426,"depth":378,"text":1427},{"id":1448,"depth":378,"text":1449},{"id":1483,"depth":373,"text":1484,"children":1691},[1692,1693],{"id":1490,"depth":378,"text":1491},{"id":1497,"depth":378,"text":1498},{"id":1521,"depth":373,"text":1522},{"id":1568,"depth":373,"text":1569},{"id":1611,"depth":373,"text":1612},{"id":319,"depth":373,"text":320},"2026-03-25","13,700+ OpenClaw skills on ClawHub. 824 were malicious. Here's how to find, vet, and safely install skills without exposing your API keys.","/img/blog/clawhub-skills-directory.jpg",{},"/blog/clawhub-skills-directory","16 min read",{"title":1182,"description":1699},"ClawHub Skills Directory: Complete 2026 Guide","blog/clawhub-skills-directory",[1708,1709,1710,1711,1712,1713,412,1714],"ClawHub skills","OpenClaw skills directory","ClawHub guide","OpenClaw skills marketplace","safe OpenClaw skills","ClawHub security","OpenClaw skill vetting","LWNEGEL0yKC-rTSJ2UV_aYxQjgRkoQROeeu9lquzosg",1779278330606]