D
Tracebit Canaries
Author: alessandro-brucato-tracebit
Use when the user wants to protect their workspace from credential theft, prompt injection, or data exfiltration — even if they don't mention "canaries" or "honeytokens" directly. Covers deploying Tracebit security canar
Source: openclaw/skills
D · Limited evidence
Author unclaimed
Clear source
Execution · High
Audit focus · prompt injection