How to Verify SPF and DKIM with OpenClaw

SPF and DKIM verification with OpenClaw and ToolRouter. Email DNS checks.

Tool
DNS Domain icon
DNS Domain

OpenClaw automates DNS monitoring into a systematic scanning workflow that covers records, SSL certificates, and email authentication in one sweep. Run comprehensive domain audits across all your production domains in a single session, compare current configurations against your documented baselines, and detect drift or unauthorized changes. Its batch approach is ideal for organizations managing dozens of domains that need regular infrastructure health checks.

Connect ToolRouter to OpenClaw

1Install the CLI
npm install -g toolrouter-mcp
2Call tools directly from OpenClaw
toolrouter-mcp call web-search search --query "AI tools"
toolrouter-mcp tools

Steps

Once connected (see setup above), use the DNS Domain tool:

  1. Ask OpenClaw: "Verify the SPF and DKIM records for example.com"
  2. OpenClaw retrieves and analyzes email authentication records
  3. Fix any issues based on the analysis

Example Prompt

Try this with OpenClaw using the DNS Domain tool
Check if our SPF and DKIM records are correct for example.com. We send via Gmail and Mailchimp.

Tips

  • SPF has a 10-lookup limit -- ask for help optimizing if you use many services
  • Check DKIM for every sending service, not just your primary one
  • Set up DMARC reporting to monitor for unauthorized use of your domain

Related Workflows

Domain Acquisition ResearchResearch domain acquisition opportunities by searching availability, checking ownership, examining DNS, and reviewing domain history.Website Migration AuditPrepare for website migration by crawling the current site, documenting SEO baselines, benchmarking performance, and recording DNS configuration.SSL and DNS AuditAudit SSL certificates, DNS configuration, HTTP security headers, and domain registration for security gaps.Subdomain Security ScanEnumerate subdomains, probe services, scan for takeover vulnerabilities, and capture visual evidence.Infrastructure Health CheckVerify DNS resolution, service availability, and server locations to ensure infrastructure is healthy and correctly configured.Domain Intelligence ReportBuild a comprehensive intelligence report on any domain using WHOIS, DNS, geolocation, and web archive data.Network ReconnaissanceMap the complete network attack surface through DNS enumeration, geolocation, service probing, and attack vector analysis.Incident Response ToolkitInvestigate security incidents by verifying DNS integrity, scanning for compromise indicators, and researching threat intelligence.Certificate MonitoringMonitor SSL/TLS certificates for expiration, verify TLS configuration, and confirm domain ownership alignment.Phishing Infrastructure AnalysisInvestigate suspected phishing domains through registration analysis, DNS inspection, geolocation, and evidence capture.Cloud Security AuditAudit cloud infrastructure by discovering assets, probing for misconfigurations, testing cloud-specific attacks, and checking CVEs.Pre-Acquisition Domain AuditAudit a domain before purchase by reviewing registration history, DNS state, web archive history, and SEO reputation.Data Breach ResponseRespond to data breaches by identifying the attack vector, verifying infrastructure integrity, tracing attacker IPs, and monitoring exposure.Continuous Security MonitoringMaintain ongoing security visibility through DNS monitoring, service probing, vulnerability scanning, and CVE tracking.