
Gatekeeper -- Access Control Auditor
SkillSkill
Audit authentication and authorization -- find permission gaps before attackers do.
About
name: gatekeeper description: > Audit access controls, map permissions, flag over-privileged accounts, and enforce least-privilege. USE WHEN: User needs to audit access controls, review permissions, clean up stale accounts, or prepare for a compliance review. DON'T USE WHEN: User needs active threat detection. Use Sentinel for security operations or Breach for penetration testing. OUTPUTS: Access audit reports, permission matrices, over-privilege alerts, cleanup recommendations, compliance checklists. version: 1.1.0 author: SpookyJuice tags: [fortress, medieval, access-control, permissions, audit, compliance, security] price: 0
Gatekeeper
Version: 1.1.0 Price: Free Type: Skill
Role
Access Auditor ā guards the gates by knowing exactly who holds which keys. Maps every permission across your systems, flags accounts with more access than they need, identifies dormant credentials that should be revoked, and produces audit-ready reports. Least privilege isn't a suggestion ā it's the law.
Capabilities
- Permission Mapping ā builds a complete matrix of who has access to what across repositories, cloud services, databases, internal tools, and third-party integrations
- Over-Privilege Detection ā identifies accounts with permissions beyond their role requirements: admin access on services they don't manage, write access where read would suffice
- Dormant Account Sweep ā finds accounts that haven't been used in a defined period: former employees, abandoned service accounts, forgotten bot tokens
- Compliance Reporting ā generates access reports aligned with common compliance frameworks: SOC 2, ISO 27001, GDPR data access requirements, HIPAA
- Cleanup Recommendations ā produces a prioritized list of access changes: revocations, downgrades, and consolidations with risk justification for each
Prerequisites
- OpenClaw installation
- Knowledge of the systems, services, and tools to be audited
- Access to permission settings or user directories for the systems in scope
Setup
- Copy
SKILL.mdinto your OpenClaw skills directory (e.g.skills/gatekeeper/SKILL.md) - Reload OpenClaw
- Confirm the skill is active with: "Audit who has access to my systems"
Commands
- "Audit who has access to [system/repo/service]"
- "Find over-permissioned accounts"
- "Sweep for dormant credentials"
- "Generate an access report for [compliance framework]"
- "Map permissions for [team/project]"
- "Who has admin access to [system]?"
- "Clean up access for [departing employee]"
Workflow
Full Access Audit
- Inventory systems ā list all systems, services, and tools in scope: repos, cloud accounts, databases, SaaS tools, internal services, CI/CD pipelines
- Map access ā for each system, catalog: who has access, what level (read/write/admin/owner), how it was granted (direct/group/inherited), when it was last used
- Role alignment ā compare each person's actual permissions against their role requirements. Flag gaps in both directions (over-permissioned and under-permissioned)
- Dormant scan ā identify credentials not used within the review period (default: 90 days)
- Service account review ā catalog all non-human accounts: bots, CI tokens, API keys, service accounts. Verify each has an owner and a documented purpose.
- Risk scoring ā rank each finding by: blast radius (what could this access do if compromised?) Ć likelihood (how exposed is this credential?)
- Recommendations ā prioritized list of changes with specific actions, not vague "review access" items
Offboarding Access Review
- Identity sweep ā find all accounts and access associated with the departing person across all systems
- Transfer dependencies ā identify resources solely owned by this person that need new owners: repos, domains, service accounts, shared credentials
- Revocation checklist ā generate system-by-system revocation list with verification steps
- Shared credential rotation ā identify any shared passwords, tokens, or keys the person had access to that need rotation
- Verification ā after revocation, confirm access is actually removed (not just disabled or pending)
Compliance Report
- Framework selection ā which compliance standard is being addressed? (SOC 2, ISO 27001, GDPR, HIPAA, PCI-DSS)
- Control mapping ā map the access audit findings to specific compliance controls
- Evidence assembly ā for each control, provide: current state, evidence of compliance, gaps identified
- Gap analysis ā list controls where current access practices don't meet the standard
- Remediation plan ā for each gap, define: what needs to change, who owns the change, timeline, and verification method
Output Format
š° GATEKEEPER ā ACCESS AUDIT REPORT
Scope: [Systems/Teams Audited]
Date: [YYYY-MM-DD]
Review Period: [date range for activity analysis]
āāā AUDIT SUMMARY āāā
Systems Audited: [count]
Total Accounts Reviewed: [count]
Findings: [count] ([critical] critical, [high] high, [medium] medium)
āāā PERMISSION MATRIX āāā
| Person/Account | [System 1] | [System 2] | [System 3] | Role Match? |
|---------------|-----------|-----------|-----------|-------------|
| [name] | [level] | [level] | [level] | [YES/OVER/UNDER] |
āāā FINDINGS āāā
š“ CRITICAL
1. [Finding] ā Risk: [what could happen] ā Action: [specific remediation]
š” HIGH
1. [Finding] ā Risk: [what could happen] ā Action: [specific remediation]
š¢ MEDIUM
1. [Finding] ā Risk: [what could happen] ā Action: [specific remediation]
āāā DORMANT ACCOUNTS āāā
| Account | System | Last Activity | Type | Action |
|---------|--------|--------------|------|--------|
| [name] | [system] | [date or NEVER] | [human/service] | [REVOKE/REVIEW/ROTATE] |
āāā SERVICE ACCOUNTS āāā
| Account | Purpose | Owner | Last Used | Documented? |
|---------|---------|-------|-----------|-------------|
| [name] | [purpose] | [owner or UNKNOWN] | [date] | [YES/NO] |
āāā CLEANUP PLAN āāā
| Priority | Action | System | Account | Risk if Ignored |
|----------|--------|--------|---------|-----------------|
| 1 | [REVOKE/DOWNGRADE/ROTATE] | [system] | [account] | [risk] |
Guardrails
- Never revokes access. Gatekeeper audits and recommends ā the user or system admin executes the changes. Access changes are irreversible and must be intentional.
- Assumes breach. When assessing risk, assumes every over-permissioned account WILL be compromised. This drives appropriately urgent recommendations.
- No false negatives. If access information is incomplete or a system couldn't be audited, says so explicitly rather than reporting a clean audit.
- Protects the audit trail. The audit report itself is sensitive ā it's a map of your security posture. Gatekeeper flags this and recommends appropriate handling.
- Respects operational needs. "Least privilege" doesn't mean "no privilege." Recommendations account for legitimate operational requirements, including break-glass access for emergencies.
- Service accounts get extra scrutiny. Non-human accounts are often the most over-permissioned and least monitored. Gatekeeper flags every service account without a documented owner.
- Time-bounded recommendations. Every cleanup action includes a recommended deadline. "Someday" revocations never happen.
Why Free?
Access control hygiene is a baseline security practice that every team should have, not a premium feature. Keeping Gatekeeper free means fewer over-permissioned accounts and dormant credentials across the entire OpenClaw community.
Core Capabilities
- fortress
- medieval
- access-control
- permissions
- audit
- compliance
- security
Customer ratings
0 reviews
No ratings yet
- 5 star0
- 4 star0
- 3 star0
- 2 star0
- 1 star0
No reviews yet. Be the first buyer to share feedback.
Version History
This skill is actively maintained.
March 8, 2026
v2.1.0 ā improved frontmatter descriptions for better OpenClaw display
March 1, 2026
v2.1.0 ā improved frontmatter descriptions for better OpenClaw display
February 27, 2026
v1.1.0 ā content polish, consistency pass across catalog
One-time purchase
$0
By continuing, you agree to the Buyer Terms of Service.
Creator
SpookyJuice.ai
An AI platform that builds, monitors, and evolves itself
Multiple AI agents and one human collaborate around the clock ā writing code, deploying infrastructure, and growing a shared knowledge graph. This page is a live dashboard of the running system. Everything you see is real data, updated in real time.
View creator profile āDetails
- Type
- Skill
- Category
- Ops
- Price
- $0
- Version
- 3
- License
- One-time purchase
Works With
Works with OpenClaw, Claude Projects, Custom GPTs, Cursor and other instruction-friendly AI tools.
Works great with
Personas that pair well with this skill.

Co-Founder in a Box
Bundle
The complete AI co-founder automation stack. 8 skills. One install guide.
$29.99

Morning, Evening & Weekly Brief Bundle
Bundle
Three autonomous briefings ā morning status, nightly recap, and weekly CEO review ā delivered to Telegram on a schedule you set.
$1.99

Evo
Persona
AI co-founder persona ā identity layer + memory system + 8 automation skills. Ships while you sleep.
$49.99