Communityv1.0.0

Insecure Defaults Detection

Detects fail-open insecure defaults (hardcoded secrets, weak auth, permissive security) that allow apps to run insecurely in production. Use when auditing security, reviewing config management, or analyzing environment variable handling.

2.3kdownloads8active installsatlas-secint
View on ClawHubBack to Skills

Skill Details

Slug
insecure-defaults
Latest Version
1.0.0
Author
atlas-secint
Published
Jan 28, 2026
Updated
Apr 28, 2026
Total Versions
1

How to Install

  1. 1 on OpenClawdBots (takes under 60 seconds).
  2. 2Open your bot dashboard and go to the Skills tab.
  3. 3Switch to the ClawHub tab and search for Insecure Defaults Detection.
  4. 4Click Install and the skill is deployed to your bot automatically.

Changelog — v1.0.0

Initial release of insecure-defaults. - Detects fail-open insecure defaults including hardcoded secrets, weak authentication, and permissive security configurations in production-reachable code. - Helps with audits, code reviews, and configuration management by focusing on environment variable handling and insecure defaults. - Clearly distinguishes between fail-open (critical) and fail-secure (safe) patterns. - Provides search guidance and verification workflow, including example patterns and report template. - Includes a thorough checklist of common insecure defaults and guidance on when findings are relevant.