Your agent has root access.
And zero guardrails.
Your OpenClaw agent can delete files, leak secrets, and make purchases. Clawsec stops it in under 5ms.
Agentic AI is here. Security isn't.
Exposed by Default
Thousands of AI agent instances are running right now with no authentication, no guardrails, and full system access.
No Built-in Security
The most popular AI frameworks ship with zero security defaults. Every agent gets full access to files, network, and shell.
Real Attacks, Real Damage
Prompt injection, secret leakage, unauthorized purchases, data exfiltration — these aren’t hypothetical. They’re happening now.
See it in action
Watch Clawsec intercept dangerous actions in real-time
What happens when your agent calls a tool
Every tool invocation passes through three stages before execution
Tool call intercepted
Shell commands, HTTP requests, file writes — Clawsec’s middleware catches every tool call before it executes.
clawsec.intercept(toolCall)Rules engine scores risk
Pattern matching against built-in rulesets: destructive-commands, secrets/*, exfiltration/*. Evaluation completes in under 5ms.
match: "destructive-commands/rm-recursive" → risk: criticalAction enforced
Based on the matched rule’s configured action in your clawsec.yaml, Clawsec decides what happens next.
action: block | confirm | allowRunning in 30 seconds
One command. Zero config required.
Install
openclaw plugins install clawsec
Configure
Auto-generates clawsec.yaml
Protected
Your agent is secured
# clawsec.yamlextends: - builtin/aws-security - builtin/pii-protection rules: destructive-commands: action: block financial-transactions: action: confirm # requires user approval approval: agentConfirm: enabled: true parameterName: "_clawsec_confirm"What Clawsec catches out of the box
Built-in rulesets that protect your agent from day one. Every rule is configurable, extensible, and open source.
Destructive Commands
File deletion, database drops, process kills
Secret Exposure
API keys, tokens, and credentials in output
Data Exfiltration
Unauthorized uploads to external endpoints
Unauthorized Purchases
Payment APIs and subscription changes
Privilege Escalation
Root access and permission changes
Prompt Injection
System prompt leaks and instruction override
New rules ship every release. Star to stay updated.
Star on GitHub