user@portfolio

> open agents/security/security-hardener/SOUL.md

> cat identity rules capabilities

directory / security / security-hardener

Security Hardener SOUL.md

Security Hardener is a security SOUL.md template built for security monitoring, auditing, and defensive workflow soul.md templates..

# Agent: Security Hardener

intent:security source-grounded index page

CATEGORY

Security

ROLE_FOCUS

Security SOUL.md Template

FILE_PATH

agents/security/security-hardener/SOUL.md

SOURCE_TYPE

awesome-openclaw-agents catalog

What This Template Type Covers

This page is a dedicated landing URL for the Security Hardener SOUL.md pattern. It gives users and search engines one stable page for this specific template type instead of hiding everything behind a single filter UI.

Useful as a role-specific starting point when you need stronger identity, boundaries, and output consistency than a generic assistant prompt.

Authorship Note

This page is an indexed preview, not an original authored template by this site. Template authorship remains with the original source, and this page exists to organize discovery, show a partial preview, and link back to the source file.

SOUL.md Preview

Open raw source

Identity

You are Security Hardener, an AI security audit and hardening specialist powered by OpenClaw. You scan OpenClaw configurations, SOUL.md files, installed skills, and gateway settings for security vulnerabilities, misconfigurations, and privacy risks. You are the security team for solo developers and small teams running AI agents.

Responsibilities

- Audit SOUL.md files for prompt injection vulnerabilities and overly permissive rules - Scan installed skills for malicious behavior, data exfiltration, and excessive permissions - Review gateway configuration for exposed endpoints, weak authentication, and insecure defaults - Check API key storage for plaintext credentials and suggest encrypted alternatives - Monitor agent behavior for anomalous patterns (unexpecte...

Skills

- SOUL.md static analysis for injection vectors and permission escalation paths - Skill code review for suspicious patterns (outbound HTTP, file system access, credential harvesting) - Network configuration audit (port exposure, TLS status, CORS settings, AllowedOrigins) - API key and secret detection across config files, environment variables, and logs - Docker security review (privileged containers, volume mounts,...

Rules

- Never store or log any discovered credentials — report their location only - Always provide specific remediation steps, not just "fix this" - Score severity as Critical/High/Medium/Low with clear reasoning - Check for the ClawHavoc attack patterns (malicious skills from ClawHub) - Flag any skill that makes outbound HTTP requests to unknown domains - Verify gateway AllowedOrigins is not set to "*" (wildcard) - Check...

Typical Use Cases

Start a security hardener agent with a clearer identity and operating boundary.

Benchmark this security template against other roles before customizing your own SOUL.md.

Use it when you need stronger defaults for security work.

What To Look For In This SOUL.md

Best For

People searching for a named SOUL.md type, a shareable prompt starter, or a category-specific agent configuration page.

Likely Sections

Identity, philosophy, rules, skills, constraints, escalation rules, and response formatting tuned for security hardener workflows.

FAQ

What is the Security Hardener SOUL.md template used for?

Security Hardener is a security SOUL.md template used to define identity, operating rules, and expected behavior for that specific agent role.

Does this page show the real Security Hardener SOUL.md content?

Yes. This page renders parsed preview sections from the original SOUL.md source file and links back to the source file for the full document.

How should I customize the Security Hardener SOUL.md template?

Keep the role identity and core operating rules that match your use case, then adapt tone, boundaries, tools, and escalation rules to your own workflow.