Pre-authorization. Post-verification. Zero-trust AI agent security.
Read the Security Architecture β
Identity and token authorization are solved problems in traditional software engineering. But in the era of autonomous AI agents, standard RBAC is not enough. Just because an agent holds a valid API token to execute a command doesn't mean its current intent is safe.
If an agent hallucinates, experiences context compaction, or falls victim to prompt injection, your standard authorization system blindly complies with the malicious intent.
SecureClaw is an enterprise-hardened fork of the popular OpenClaw framework. It replaces probabilistic "LLM-as-a-judge" safety measures with a deterministic, Zero-Trust execution harness.
SecureClaw wraps the standard OpenClaw execution loop with an embedded Rust sidecar (predicate-authorityd) that enforces safety in two places:
- Pre-Execution Gate (The Gate): Before the orchestrator executes an action (e.g., a bash command or browser click), it is intercepted and evaluated against a local, fail-closed JSON policy. It blocks rogue intents in <1ms before the OS even sees them.
- Post-Execution Verification (The Math): SecureClaw uses deterministic math based on state changes (e.g.,
url_contains('example.com')) to instantly evaluate if an action succeeded, completely eliminating hallucination risks in the validation step.
Website Β· Security Docs Β· Policies Directory Β· Discord
SecureClaw requires Node β₯22 and is distributed under the official Predicate Systems NPM scope to guarantee supply-chain integrity.
# Install via the official scoped package
npm install -g @predicatesystems/secureclaw@latest
# or: pnpm add -g @predicatesystems/secureclaw@latest
# Initialize with strict security defaults
secureclaw onboard --install-daemon --strict-modeBy default, SecureClaw runs in a walled garden. You must define explicit permissions in your local policy files.
# Start the Gateway with the Rust interceptor enabled
secureclaw gateway --port 18789 --policy-file policies/strict.json --verbose
# Send an intent to the agent
secureclaw agent --message "Read the ssh config" --thinking high
# If the policy does not explicitly allow fs.read on ~/.ssh, it will be hard-blocked in <1ms.SecureClaw ships with four ready-to-use policy templates in the policies/ directory. Pick the one that matches your security posture:
| Policy | Use Case | What It Does |
|---|---|---|
strict.json |
Production default | Workspace-isolated writes, blocks sensitive files (.env, .ssh/), allows safe shell commands and HTTPS. Start here. |
strict-web-only.json |
Browser automation | Zero local access. Blocks ALL filesystem and shell. Only allows HTTPS navigation to allowlisted domains. |
read-only-local.json |
Code review agents | Read anywhere, write nowhere. Allows cat, grep, git status but blocks rm, git push, writes. |
audit-only.json |
Agent profiling | Allows everything (except catastrophic commands) with full logging. Use to learn what policies you need. |
secureclaw gateway --port 18789 --policy-file policies/read-only-local.jsonsecureclaw gateway --port 18789 --policy-file policies/strict-web-only.json- Start with
audit-only.jsonto observe what your agent actually does - Review the authorization logs to see requested actions
- Copy the closest template and customize the rules
- See
policies/README.mdfor the full schema reference
SecureClaw inherits the massive, highly flexible integration ecosystem of upstream OpenClaw, allowing you to deploy secure agents across any surface.
- Multi-channel Inbox: Connect to WhatsApp, Telegram, Slack, Discord, Microsoft Teams, Signal, and Matrix.
- First-Class Tools: Native browser control (via Sentience DOM pruning), system cron, macOS Canvas, and iOS/Android nodes.
- Remote Gateway Operations: Run your agent safely on headless Linux servers while maintaining remote access via Tailscale Serve/Funnel or SSH tunnels.
(For full channel setup instructions, see the Upstream Integration Guides)
| OpenAI | Blacksmith |
|---|---|
- Local-first Gateway β single control plane for sessions, channels, tools, and events.
- Multi-channel inbox β WhatsApp, Telegram, Slack, Discord, Google Chat, Signal, BlueBubbles (iMessage), iMessage (legacy), Microsoft Teams, Matrix, Zalo, Zalo Personal, WebChat, macOS, iOS/Android.
- Multi-agent routing β route inbound channels/accounts/peers to isolated agents (workspaces + per-agent sessions).
- Voice Wake + Talk Mode β always-on speech for macOS/iOS/Android with ElevenLabs.
- Live Canvas β agent-driven visual workspace with A2UI.
- First-class tools β browser, canvas, nodes, cron, sessions, and Discord/Slack actions.
- Companion apps β macOS menu bar app + iOS/Android nodes.
- Onboarding + skills β wizard-driven setup with bundled/managed/workspace skills.
- Gateway WS control plane with sessions, presence, config, cron, webhooks, Control UI, and Canvas host.
- CLI surface: gateway, agent, send, wizard, and doctor.
- Pi agent runtime in RPC mode with tool streaming and block streaming.
- Session model:
mainfor direct chats, group isolation, activation modes, queue modes, reply-back. Group rules: Groups. - Media pipeline: images/audio/video, transcription hooks, size caps, temp file lifecycle. Audio details: Audio.
- Channels: WhatsApp (Baileys), Telegram (grammY), Slack (Bolt), Discord (discord.js), Google Chat (Chat API), Signal (signal-cli), BlueBubbles (iMessage, recommended), iMessage (legacy imsg), Microsoft Teams (extension), Matrix (extension), Zalo (extension), Zalo Personal (extension), WebChat.
- Group routing: mention gating, reply tags, per-channel chunking and routing. Channel rules: Channels.
- macOS app: menu bar control plane, Voice Wake/PTT, Talk Mode overlay, WebChat, debug tools, remote gateway control.
- iOS node: Canvas, Voice Wake, Talk Mode, camera, screen recording, Bonjour pairing.
- Android node: Canvas, Talk Mode, camera, screen recording, optional SMS.
- macOS node mode: system.run/notify + canvas/camera exposure.
- Browser control: dedicated openclaw Chrome/Chromium, snapshots, actions, uploads, profiles.
- Canvas: A2UI push/reset, eval, snapshot.
- Nodes: camera snap/clip, screen record, location.get, notifications.
- Cron + wakeups; webhooks; Gmail Pub/Sub.
- Skills platform: bundled, managed, and workspace skills with install gating + UI.
- Channel routing, retry policy, and streaming/chunking.
- Presence, typing indicators, and usage tracking.
- Models, model failover, and session pruning.
- Security and troubleshooting.
- Control UI + WebChat served directly from the Gateway.
- Tailscale Serve/Funnel or SSH tunnels with token/password auth.
- Nix mode for declarative config; Docker-based installs.
- Doctor migrations, logging.
WhatsApp / Telegram / Slack / Discord / Google Chat / Signal / iMessage / BlueBubbles / Microsoft Teams / Matrix / Zalo / Zalo Personal / WebChat
β
βΌ
βββββββββββββββββββββββββββββββββ
β Gateway β
β (control plane) β
β ws://127.0.0.1:18789 β
ββββββββββββββββ¬βββββββββββββββββ
β
ββ Pi agent (RPC)
ββ CLI (openclaw β¦)
ββ WebChat UI
ββ macOS app
ββ iOS / Android nodes
- Gateway WebSocket network β single WS control plane for clients, tools, and events (plus ops: Gateway runbook).
- Tailscale exposure β Serve/Funnel for the Gateway dashboard + WS (remote access: Remote).
- Browser control β openclawβmanaged Chrome/Chromium with CDP control.
- Canvas + A2UI β agentβdriven visual workspace (A2UI host: Canvas/A2UI).
- Voice Wake + Talk Mode β alwaysβon speech and continuous conversation.
- Nodes β Canvas, camera snap/clip, screen record,
location.get, notifications, plus macOSβonlysystem.run/system.notify.
SecureClaw can auto-configure Tailscale Serve (tailnet-only) or Funnel (public) while the Gateway stays bound to loopback. Configure gateway.tailscale.mode:
off: no Tailscale automation (default).serve: tailnet-only HTTPS viatailscale serve(uses Tailscale identity headers by default).funnel: public HTTPS viatailscale funnel(requires shared password auth).
Notes:
gateway.bindmust stayloopbackwhen Serve/Funnel is enabled (SecureClaw enforces this).- Serve can be forced to require a password by setting
gateway.auth.mode: "password"orgateway.auth.allowTailscale: false. - Funnel refuses to start unless
gateway.auth.mode: "password"is set. - Optional:
gateway.tailscale.resetOnExitto undo Serve/Funnel on shutdown.
Details: Tailscale guide Β· Web surfaces
Itβs perfectly fine to run the Gateway on a small Linux instance. Clients (macOS app, CLI, WebChat) can connect over Tailscale Serve/Funnel or SSH tunnels, and you can still pair device nodes (macOS/iOS/Android) to execute deviceβlocal actions when needed.
- Gateway host runs the exec tool and channel connections by default.
- Device nodes run deviceβlocal actions (
system.run, camera, screen recording, notifications) vianode.invoke. In short: exec runs where the Gateway lives; device actions run where the device lives.
Details: Remote access Β· Nodes Β· Security
The macOS app can run in node mode and advertises its capabilities + permission map over the Gateway WebSocket (node.list / node.describe). Clients can then execute local actions via node.invoke:
system.runruns a local command and returns stdout/stderr/exit code; setneedsScreenRecording: trueto require screen-recording permission (otherwise youβll getPERMISSION_MISSING).system.notifyposts a user notification and fails if notifications are denied.canvas.*,camera.*,screen.record, andlocation.getare also routed vianode.invokeand follow TCC permission status.
Elevated bash (host permissions) is separate from macOS TCC:
- Use
/elevated on|offto toggle perβsession elevated access when enabled + allowlisted. - Gateway persists the perβsession toggle via
sessions.patch(WS method) alongsidethinkingLevel,verboseLevel,model,sendPolicy, andgroupActivation.
Details: Nodes Β· macOS app Β· Gateway protocol
- Use these to coordinate work across sessions without jumping between chat surfaces.
sessions_listβ discover active sessions (agents) and their metadata.sessions_historyβ fetch transcript logs for a session.sessions_sendβ message another session; optional replyβback pingβpong + announce step (REPLY_SKIP,ANNOUNCE_SKIP).
Details: Session tools
ClawHub is a minimal skill registry. With ClawHub enabled, the agent can search for skills automatically and pull in new ones as needed.
Send these in WhatsApp/Telegram/Slack/Google Chat/Microsoft Teams/WebChat (group commands are owner-only):
/statusβ compact session status (model + tokens, cost when available)/newor/resetβ reset the session/compactβ compact session context (summary)/think <level>β off|minimal|low|medium|high|xhigh (GPT-5.2 + Codex models only)/verbose on|off/usage off|tokens|fullβ per-response usage footer/restartβ restart the gateway (owner-only in groups)/activation mention|alwaysβ group activation toggle (groups only)
The Gateway alone delivers a great experience. All apps are optional and add extra features.
If you plan to build/run companion apps, follow the platform runbooks below.
- Menu bar control for the Gateway and health.
- Voice Wake + push-to-talk overlay.
- WebChat + debug tools.
- Remote gateway control over SSH.
Note: signed builds required for macOS permissions to stick across rebuilds (see docs/mac/permissions.md).
- Pairs as a node via the Bridge.
- Voice trigger forwarding + Canvas surface.
- Controlled via
openclaw nodes β¦.
Runbook: iOS connect.
- Pairs via the same Bridge + pairing flow as iOS.
- Exposes Canvas, Camera, and Screen capture commands.
- Runbook: Android connect.
- Workspace root:
~/.openclaw/workspace(configurable viaagents.defaults.workspace). - Injected prompt files:
AGENTS.md,SOUL.md,TOOLS.md. - Skills:
~/.openclaw/workspace/skills/<skill>/SKILL.md.
Minimal ~/.openclaw/openclaw.json (model + defaults):
{
agent: {
model: "anthropic/claude-opus-4-6",
},
}Full configuration reference (all keys + examples).
- Default: tools run on the host for the main session, so the agent has full access when itβs just you.
- Group/channel safety: set
agents.defaults.sandbox.mode: "non-main"to run nonβmain sessions (groups/channels) inside perβsession Docker sandboxes; bash then runs in Docker for those sessions. - Sandbox defaults: allowlist
bash,process,read,write,edit,sessions_list,sessions_history,sessions_send,sessions_spawn; denylistbrowser,canvas,nodes,cron,discord,gateway.
Details: Security guide Β· Docker + sandboxing Β· Sandbox config
- Link the device:
pnpm openclaw channels login(stores creds in~/.openclaw/credentials). - Allowlist who can talk to the assistant via
channels.whatsapp.allowFrom. - If
channels.whatsapp.groupsis set, it becomes a group allowlist; include"*"to allow all.
- Set
TELEGRAM_BOT_TOKENorchannels.telegram.botToken(env wins). - Optional: set
channels.telegram.groups(withchannels.telegram.groups."*".requireMention); when set, it is a group allowlist (include"*"to allow all). Alsochannels.telegram.allowFromorchannels.telegram.webhookUrl+channels.telegram.webhookSecretas needed.
{
channels: {
telegram: {
botToken: "123456:ABCDEF",
},
},
}- Set
SLACK_BOT_TOKEN+SLACK_APP_TOKEN(orchannels.slack.botToken+channels.slack.appToken).
- Set
DISCORD_BOT_TOKENorchannels.discord.token(env wins). - Optional: set
commands.native,commands.text, orcommands.useAccessGroups, pluschannels.discord.allowFrom,channels.discord.guilds, orchannels.discord.mediaMaxMbas needed.
{
channels: {
discord: {
token: "1234abcd",
},
},
}- Requires
signal-cliand achannels.signalconfig section.
- Recommended iMessage integration.
- Configure
channels.bluebubbles.serverUrl+channels.bluebubbles.passwordand a webhook (channels.bluebubbles.webhookPath). - The BlueBubbles server runs on macOS; the Gateway can run on macOS or elsewhere.
- Legacy macOS-only integration via
imsg(Messages must be signed in). - If
channels.imessage.groupsis set, it becomes a group allowlist; include"*"to allow all.
- Configure a Teams app + Bot Framework, then add a
msteamsconfig section. - Allowlist who can talk via
msteams.allowFrom; group access viamsteams.groupAllowFromormsteams.groupPolicy: "open".
- Uses the Gateway WebSocket; no separate WebChat port/config.
Browser control (optional):
{
browser: {
enabled: true,
color: "#FF4500",
},
}Use these when youβre past the onboarding flow and want the deeper reference.
- Start with the docs index for navigation and βwhatβs where.β
- Read the architecture overview for the gateway + protocol model.
- Use the full configuration reference when you need every key and example.
- Run the Gateway by the book with the operational runbook.
- Learn how the Control UI/Web surfaces work and how to expose them safely.
- Understand remote access over SSH tunnels or tailnets.
- Follow the onboarding wizard flow for a guided setup.
- Wire external triggers via the webhook surface.
- Set up Gmail Pub/Sub triggers.
- Learn the macOS menu bar companion details.
- Platform guides: Windows (WSL2), Linux, macOS, iOS, Android
- Debug common failures with the troubleshooting guide.
- Review security guidance before exposing anything.
- Skills config
- Default AGENTS
- Templates: AGENTS
- Templates: BOOTSTRAP
- Templates: IDENTITY
- Templates: SOUL
- Templates: TOOLS
- Templates: USER
SecureClaw was built for Molty, a space lobster AI assistant. π¦ by Peter Steinberger and the community.
See CONTRIBUTING.md for guidelines, maintainers, and how to submit PRs. AI/vibe-coded PRs welcome! π€
Special thanks to Mario Zechner for his support and for pi-mono. Special thanks to Adam Doppelt for lobster.bot.
Thanks to all clawtributors: