Skip to content

znary/securityclaw

Repository files navigation

SecurityClaw

中文文档

X / @znarygo

Use OpenClaw on your primary machine with confidence.

SecurityClaw is a comprehensive security plugin for OpenClaw that provides runtime policy enforcement, system hardening, and risk detection for LLM agents.

What Problem Does It Solve?

LLM agents can execute powerful tools and access sensitive resources with minimal oversight. SecurityClaw provides multi-layered protection:

  • Runtime Protection: Intercepts and evaluates every tool call against security policies
  • System Hardening: Scans OpenClaw configuration for security misconfigurations
  • Plugin Security: Analyzes installed plugins for risky code patterns and dependencies
  • Skill Monitoring: Tracks custom skills for undeclared changes and high-risk operations
  • Approval Workflows: Routes high-risk operations to admins for explicit confirmation
  • Data Protection: Detects and masks sensitive data in outputs and logs

Architecture

graph TB
    subgraph "Notification Channels"
        CH[Telegram/Slack/Discord/etc.]
    end
    
    subgraph "LLM Agent Layer"
        A[Agent Request]
    end
    
    subgraph "OpenClaw Gateway"
        B[Gateway]
    end
    
    subgraph "SecurityClaw Plugin"
        subgraph "Admin Interface"
            H[Web Dashboard<br/>Rules/Accounts/System/Skills/Plugins]
        end
        
        C[Hook Interceptor]
        
        subgraph "Runtime Protection"
            D1[Policy Guard]
            D2[File Rules]
            D3[DLP Scanner]
        end
        
        subgraph "System Security"
            E1[Config Scanner<br/>ClawGuard]
            E2[Plugin Analyzer]
            E3[Skill Monitor]
        end
        
        F[Decision Engine]
        G[Approval Service]
    end
    
    CH -->|Agent Request| A
    A --> B
    B --> C
    C --> D1 & D2 & D3
    D1 & D2 & D3 --> F
    F -->|allow| B
    F -->|challenge| G
    F -->|block| B
    G -->|Approval Request| CH
    H -.->|Configure| D1 & D2
    H -.->|Scan & Fix| E1 & E2 & E3
Loading

Installation

npx securityclaw install

Or use the install script:

curl -fsSL https://raw.githubusercontent.com/znary/securityclaw/main/install.sh | bash

The admin dashboard will open automatically at http://127.0.0.1:4780 after installation.

Development Setup

git clone https://github.com/znary/securityclaw.git
cd securityclaw
npm install
npm run openclaw:dev:install
npm test

Uninstall

openclaw plugins uninstall securityclaw

Admin Dashboard

Features

Access the web UI at http://127.0.0.1:4780:

Overview Tab: Real-time decision metrics, recent events, and system health

Rules Tab: View and edit policy rules, configure file rules, manage sensitive path patterns

Accounts Tab: Configure per-user/channel access modes, assign admin approvers, view active sessions

System Tab (ClawGuard): Scan OpenClaw configuration for security risks, apply one-click fixes with preview

Skills Tab: View discovered skills with risk scores, quarantine or trust-override, configure interception policy

Plugins Tab: Analyze installed plugins, review risk signals (execution, network, dependencies)

Events Tab: Audit log of all security decisions with filtering

Overview

Overview

The web-based admin dashboard provides centralized management and visibility into SecurityClaw's protection layers.

Core Capabilities

1. Runtime Policy Enforcement

Tools & Rules

Intercepts tool calls at OpenClaw hook points and enforces security decisions:

  • Policy Rules: Match by tool, operation, file path, asset label, data sensitivity
  • File Rules: Path-based access control with operation-specific decisions
  • Approval Workflows: Challenge high-risk operations with multi-channel notifications
  • DLP Engine: Detect and mask PII, credentials, tokens in outputs
  • Audit Logging: Structured decision events with trace IDs and reason codes

Events Log

2. System Hardening (ClawGuard)

System Hardening

Scans OpenClaw configuration for security risks and provides automated fixes:

  • Gateway Security: Checks bind address, authentication, service discovery
  • Sandbox Configuration: Validates isolation boundaries and tool policies
  • Channel Access Control: Reviews DM/group policies and allowlists
  • Workspace Bootstrap: Audits SOUL.md for prompt injection defenses
  • One-Click Remediation: Generates config patches with preview and rollback

Apply Fix Dialog

3. Plugin Security Analysis

Plugin Analysis

Discovers and analyzes installed OpenClaw plugins:

  • Risk Scoring: Evaluates source, install location, code signals, dependencies
  • Code Pattern Detection: Identifies execution capabilities, network access, file operations
  • Dependency Surface: Maps npm dependencies and config requirements
  • Source Verification: Flags local path sources and non-registry installs

4. Skill Interception & Monitoring

Skill Monitoring

Tracks custom skills for security risks:

  • Content Drift Detection: Alerts when skill content changes without version updates
  • Risk Matrix: Combines skill risk tier with operation severity for dynamic decisions
  • Quarantine & Trust: Manual override controls for high-risk or trusted skills
  • Activity Tracking: Records skill invocations and interception events
  • Policy Thresholds: Configurable score cutoffs and fallback actions

Configuration

SecurityClaw uses a YAML policy file (config/policy.default.yaml) with runtime overrides stored in SQLite:

  • Policy Rules: Match conditions (tool, operation, labels) and decisions
  • File Rules: Path-based access control with operation-specific decisions
  • Sensitive Paths: Map file patterns to asset labels
  • DLP Patterns: Regex patterns for detecting and masking sensitive data
  • Account Policies: Per-user/channel access modes and admin privileges
  • Skill Policy: Risk thresholds, severity matrix, fallback actions

License

MIT. See LICENSE.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors