@goplus/agentguard 1.0.10 → 1.0.12

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goplus/agentguard",
3
- "version": "1.0.10",
3
+ "version": "1.0.12",
4
4
  "description": "GoPlus AgentGuard — Security guard for AI agents. Blocks dangerous commands, prevents data leaks, protects secrets. 20 detection rules, runtime action evaluation, trust registry.",
5
5
  "main": "dist/index.js",
6
6
  "types": "dist/index.d.ts",
@@ -1,6 +1,6 @@
1
1
  ---
2
2
  name: agentguard
3
- description: GoPlus AgentGuard — AI agent security guard. Automatically blocks dangerous commands, prevents data leaks, and protects secrets. Use when reviewing third-party code, auditing skills, checking for vulnerabilities, evaluating action safety, running security patrols, or viewing security logs.
3
+ description: GoPlus AgentGuard — AI agent security guard. Run /agentguard checkup for a full security health check: scans all installed skills, checks credentials, permissions, and network exposure, then delivers an HTML report directly to you. Also use for scanning third-party code, blocking dangerous commands, preventing data leaks, evaluating action safety, and running daily security patrols.
4
4
  license: MIT
5
5
  compatibility: Requires Node.js 18+. Optional GoPlus API credentials for enhanced Web3 simulation.
6
6
  metadata:
@@ -8,7 +8,7 @@ metadata:
8
8
  version: "1.1"
9
9
  optional_env: "GOPLUS_API_KEY, GOPLUS_API_SECRET (for Web3 transaction simulation only)"
10
10
  user-invocable: true
11
- allowed-tools: Read, Grep, Glob, Bash(node scripts/trust-cli.ts *) Bash(node scripts/action-cli.ts *) Bash(node scripts/checkup-report.js) Bash(openclaw *) Bash(ss *) Bash(lsof *) Bash(ufw *) Bash(iptables *) Bash(crontab *) Bash(systemctl list-timers *) Bash(find *) Bash(stat *) Bash(env) Bash(sha256sum *)
11
+ allowed-tools: Read, Grep, Glob, Bash(node *trust-cli.ts *) Bash(node *action-cli.ts *) Bash(*checkup-report.js) Bash(echo *checkup-report.js) Bash(cat *checkup-report.js) Bash(openclaw *) Bash(ss *) Bash(lsof *) Bash(ufw *) Bash(iptables *) Bash(crontab *) Bash(systemctl list-timers *) Bash(find *) Bash(stat *) Bash(env) Bash(sha256sum *) Bash(node *) Bash(cd *)
12
12
  argument-hint: "[scan|action|patrol|trust|report|config|checkup] [args...]"
13
13
  ---
14
14
 
@@ -16,6 +16,19 @@ argument-hint: "[scan|action|patrol|trust|report|config|checkup] [args...]"
16
16
 
17
17
  You are a security auditor powered by the GoPlus AgentGuard framework. Route the user's request based on the first argument.
18
18
 
19
+ ## Important: Resolving Script Paths
20
+
21
+ All commands in this skill reference `scripts/` as a relative path. You **MUST** resolve this to the absolute path of this skill's directory before running any command. To find the skill directory:
22
+
23
+ 1. This SKILL.md file's parent directory **is** the skill directory
24
+ 2. If this file is at `/path/to/agentguard/SKILL.md`, then scripts are at `/path/to/agentguard/scripts/`
25
+ 3. Before running any `node scripts/...` command, **always `cd` into the skill directory first**, or use the full absolute path
26
+
27
+ Example: if this SKILL.md is at `~/.openclaw/skills/agentguard/SKILL.md`, run:
28
+ ```bash
29
+ cd ~/.openclaw/skills/agentguard && node scripts/checkup-report.js
30
+ ```
31
+
19
32
  ## Command Routing
20
33
 
21
34
  Parse `$ARGUMENTS` to determine the subcommand:
@@ -721,12 +734,12 @@ Assemble the results into a JSON object and pipe it to the report generator:
721
734
  }
722
735
  ```
723
736
 
724
- Execute:
737
+ Execute (remember to `cd` into the skill directory first — see "Resolving Script Paths" above):
725
738
  ```bash
726
- echo '<json>' | node scripts/checkup-report.js
739
+ cd <skill_directory> && echo '<json>' | node scripts/checkup-report.js
727
740
  ```
728
741
 
729
- The script outputs the HTML file path to stdout and opens it in the browser automatically.
742
+ The script outputs the HTML file path to stdout (e.g. `/tmp/agentguard-checkup-1234567890.html`). Capture this path — you will need it for delivery in Step 6.
730
743
 
731
744
  ### Step 5: Terminal Summary
732
745
 
@@ -752,6 +765,42 @@ After the report generates, output a brief summary in the terminal:
752
765
  💡 Top recommendation: <first recommendation text>
753
766
  ```
754
767
 
768
+ ### Step 6: Deliver the Report to the User
769
+
770
+ After printing the terminal summary, deliver the HTML report file. You **MUST** always output the `MEDIA:` token, and then also deliver via the appropriate channel method.
771
+
772
+ #### 6a. MEDIA token (required — always do this)
773
+
774
+ Output the following line on its **own line** in your response:
775
+
776
+ ```
777
+ MEDIA:<file_path>
778
+ ```
779
+
780
+ For example: `MEDIA:/tmp/agentguard-checkup-1234567890.html`
781
+
782
+ This is how platforms like OpenClaw automatically deliver the file as a Telegram/Discord/WhatsApp attachment via `sendDocument`. The platform strips this line from visible text — the user won't see it. **Always output this regardless of what channel you think you're in.**
783
+
784
+ #### 6b. Channel-specific delivery (in addition to MEDIA token)
785
+
786
+ **Claude Code (local desktop)**
787
+ - The browser should already be open from Step 4.
788
+ - Also copy to Desktop: `cp <file_path> ~/Desktop/agentguard-checkup-$(date +%Y-%m-%d).html`
789
+ - Tell the user: "✅ Report saved to your Desktop and opened in browser."
790
+
791
+ **Claude.ai web**
792
+ - Read the generated HTML file and output it as a **code artifact** (language: `html`).
793
+ - Tell the user: "✅ Your report is attached above — click the download icon to save it."
794
+
795
+ **API / headless / Telegram / other**
796
+ - The `MEDIA:` token above handles file delivery automatically.
797
+ - Also print the file path for reference.
798
+
799
+ Regardless of channel, always end with:
800
+ ```
801
+ 🦞 Stay safe — run /agentguard checkup anytime to get a fresh report.
802
+ ```
803
+
755
804
  Append a summary entry to `~/.agentguard/audit.jsonl`:
756
805
  ```json
757
806
  {"timestamp":"...","event":"checkup","composite_score":<n>,"tier":"<grade>","checks":6,"findings":<count>,"skills_scanned":<count>}