Step 1
Run security audit
Start with the built-in audit, then read the critical findings before you touch anything else.
Why it matters
You need a current baseline. `openclaw security audit --deep` checks common footguns across gateway exposure, browser exposure, elevated allowlists, and local file permissions. Critical findings should be treated as active exposure, not backlog.
- Use `--deep` when you want the extra best-effort live Gateway probe, not just static config checks.
- Look at both `critical` and `warn`, but treat `critical` as stop-the-line work.
- Review the report before using `--fix`; the fix path tightens safe defaults like channel policy, sensitive-log redaction, and local file permissions.
1openclaw security audit --deep