Use OpenClaw on your primary machine with confidence.
SecurityClaw is a comprehensive security plugin for OpenClaw that provides runtime policy enforcement, system hardening, and risk detection for LLM agents.
LLM agents can execute powerful tools and access sensitive resources with minimal oversight. SecurityClaw provides multi-layered protection:
- Runtime Protection: Intercepts and evaluates every tool call against security policies
- System Hardening: Scans OpenClaw configuration for security misconfigurations
- Plugin Security: Analyzes installed plugins for risky code patterns and dependencies
- Skill Monitoring: Tracks custom skills for undeclared changes and high-risk operations
- Approval Workflows: Routes high-risk operations to admins for explicit confirmation
- Data Protection: Detects and masks sensitive data in outputs and logs
graph TB
subgraph "Notification Channels"
CH[Telegram/Slack/Discord/etc.]
end
subgraph "LLM Agent Layer"
A[Agent Request]
end
subgraph "OpenClaw Gateway"
B[Gateway]
end
subgraph "SecurityClaw Plugin"
subgraph "Admin Interface"
H[Web Dashboard<br/>Rules/Accounts/System/Skills/Plugins]
end
C[Hook Interceptor]
subgraph "Runtime Protection"
D1[Policy Guard]
D2[File Rules]
D3[DLP Scanner]
end
subgraph "System Security"
E1[Config Scanner<br/>ClawGuard]
E2[Plugin Analyzer]
E3[Skill Monitor]
end
F[Decision Engine]
G[Approval Service]
end
CH -->|Agent Request| A
A --> B
B --> C
C --> D1 & D2 & D3
D1 & D2 & D3 --> F
F -->|allow| B
F -->|challenge| G
F -->|block| B
G -->|Approval Request| CH
H -.->|Configure| D1 & D2
H -.->|Scan & Fix| E1 & E2 & E3
npx securityclaw installOr use the install script:
curl -fsSL https://raw.githubusercontent.com/znary/securityclaw/main/install.sh | bashThe admin dashboard will open automatically at http://127.0.0.1:4780 after installation.
git clone https://github.com/znary/securityclaw.git
cd securityclaw
npm install
npm run openclaw:dev:install
npm testopenclaw plugins uninstall securityclawAccess the web UI at http://127.0.0.1:4780:
Overview Tab: Real-time decision metrics, recent events, and system health
Rules Tab: View and edit policy rules, configure file rules, manage sensitive path patterns
Accounts Tab: Configure per-user/channel access modes, assign admin approvers, view active sessions
System Tab (ClawGuard): Scan OpenClaw configuration for security risks, apply one-click fixes with preview
Skills Tab: View discovered skills with risk scores, quarantine or trust-override, configure interception policy
Plugins Tab: Analyze installed plugins, review risk signals (execution, network, dependencies)
Events Tab: Audit log of all security decisions with filtering
The web-based admin dashboard provides centralized management and visibility into SecurityClaw's protection layers.
Intercepts tool calls at OpenClaw hook points and enforces security decisions:
- Policy Rules: Match by tool, operation, file path, asset label, data sensitivity
- File Rules: Path-based access control with operation-specific decisions
- Approval Workflows: Challenge high-risk operations with multi-channel notifications
- DLP Engine: Detect and mask PII, credentials, tokens in outputs
- Audit Logging: Structured decision events with trace IDs and reason codes
Scans OpenClaw configuration for security risks and provides automated fixes:
- Gateway Security: Checks bind address, authentication, service discovery
- Sandbox Configuration: Validates isolation boundaries and tool policies
- Channel Access Control: Reviews DM/group policies and allowlists
- Workspace Bootstrap: Audits SOUL.md for prompt injection defenses
- One-Click Remediation: Generates config patches with preview and rollback
Discovers and analyzes installed OpenClaw plugins:
- Risk Scoring: Evaluates source, install location, code signals, dependencies
- Code Pattern Detection: Identifies execution capabilities, network access, file operations
- Dependency Surface: Maps npm dependencies and config requirements
- Source Verification: Flags local path sources and non-registry installs
Tracks custom skills for security risks:
- Content Drift Detection: Alerts when skill content changes without version updates
- Risk Matrix: Combines skill risk tier with operation severity for dynamic decisions
- Quarantine & Trust: Manual override controls for high-risk or trusted skills
- Activity Tracking: Records skill invocations and interception events
- Policy Thresholds: Configurable score cutoffs and fallback actions
SecurityClaw uses a YAML policy file (config/policy.default.yaml) with runtime overrides stored in SQLite:
- Policy Rules: Match conditions (tool, operation, labels) and decisions
- File Rules: Path-based access control with operation-specific decisions
- Sensitive Paths: Map file patterns to asset labels
- DLP Patterns: Regex patterns for detecting and masking sensitive data
- Account Policies: Per-user/channel access modes and admin privileges
- Skill Policy: Risk thresholds, severity matrix, fallback actions
MIT. See LICENSE.






