AegisClaw is a secure-by-default runtime and security envelope for OpenClaw-style personal AI agents.
Goal: Make "agentic automation" safe enough for individuals by default, and scalable enough for teams.
AegisClaw acts as a security envelope around your AI agents, providing sandboxing, granular permissions, and human-in-the-loop approvals.
- π³ Hardened Sandbox: Executes agent skills in a restricted Docker container (non-root, read-only rootfs, dropped capabilities, seccomp).
- π‘οΈ Granular Scopes: Permission model (e.g.,
files.read:/home/user/docs,shell.exec,net.outbound:github.com). - ποΈ Security Visualization: Active "Security Envelope" indicator confirming sandbox isolation and protection status.
- π Adapter Health: Real-time connection monitoring to the OpenClaw agent runtime.
- π« Active Secret Redaction: Automatically scrubs secrets from logs and console output if they leak.
- π Emergency Lockdown: "PANIC BUTTON" to instantly kill all running skills and block new executions.
- β Human-in-the-Loop: TUI-based approval system for high-risk actions.
- π Secret Encryption:
age-based encryption for sensitive API keys. - π Audit Logging: Tamper-evident, hash-chained logs with explainable decision tooltips.
- π₯οΈ Web Dashboard: Modern, dark-mode GUI for live monitoring and management.
The V4 Dashboard features a dedicated Security Operations Center with:
- Active Security Envelope: Visual confirmation of sandbox isolation.
- OpenClaw Status: Real-time connection health and latency metrics.
- Explainable Audits: Tooltips explaining why an action was allowed or denied.
# Clone the repository
git clone https://github.com/mackeh/AegisClaw.git
cd AegisClaw
# Build the binary
go build -o aegisclaw ./cmd/aegisclaw
# Verify installation
./aegisclaw --versionCreate the default configuration structure in ~/.aegisclaw:
./aegisclaw initInitialize the encryption keys and set a secret:
./aegisclaw secrets init
./aegisclaw secrets set OPENAI_API_KEY sk-proj-12345Test the hardened runtime using a Docker image:
# This runs 'echo' inside the sandbox
./aegisclaw sandbox run-sandbox alpine:latest echo "Hello Safe World"Check the immutable log of actions:
./aegisclaw logs
./aegisclaw logs verify # Check cryptographic integrityAegisClaw supports distributed orchestration with centralized policy and audit:
# On Leader Node (manages policies and aggregates logs)
./aegisclaw cluster status --role leader --address 10.0.0.1:9090
# On Follower Node (joins the cluster to execute skills)
./aegisclaw cluster join 10.0.0.1:9090 --node-id worker-1AegisClaw includes a modern web-based dashboard for easy monitoring and management.
Start the AegisClaw API and UI server:
./aegisclaw serve --port 8080Then, open your browser and navigate to http://localhost:8080.
- System Overview: Monitor system status, total executions, and the active policy mode (OPA/Rego).
- Skill Management:
- Installed Skills: View all locally available skills and run them with a single click.
- Skill Store: Search the remote registry for new skills and install them directly from the UI.
- Live Monitoring:
- Real-time Terminal: When running a skill, a live terminal pops up showing real-time logs with active secret redaction.
- OpenClaw Adapter Health: Dashboard OpenClaw status is backed by live API checks (
GET /api/openclaw/health) with latency, readiness state, and inline health details for troubleshooting. - Audit Activity: View the most recent actions taken by your agents.
- Security Tools:
- Log Verification: Click "Verify Integrity" in the audit section to cryptographically prove the logs haven't been tampered with.
- Emergency Stop: The prominent red EMERGENCY STOP button instantly kills all running skill containers and locks the runtime.
This section shows how to integrate OpenClaw agents with AegisClaw while preserving AegisClaw's security guarantees (sandboxing, scoped permissions, audit logging).
Prerequisites
- AegisClaw built and configured (see Quick Start)
- Docker installed and running
- OpenClaw agent or skill package (container image or source)
Steps
- Store OpenClaw credentials in AegisClaw secrets
# Store the OpenClaw API key (example)
./aegisclaw secrets set OPENCLAW_API_KEY sk-openclaw-xxxxx- Enable/configure the OpenClaw adapter
AegisClaw includes an OpenClaw adapter that mediates communication between agents and external services. Enable it by creating an adapter config at ~/.aegisclaw/adapters/openclaw.yaml:
enabled: true
endpoint: "http://localhost:8080" # or the OpenClaw service URL
api_key_secret: "OPENCLAW_API_KEY" # name in aegisclaw secrets
timeout_ms: 5000- Register your OpenClaw-based skill/agent (manifest)
Create a skill manifest that AegisClaw can run in the sandbox. Example skills/web-search.yaml:
name: web-search
image: ghcr.io/openclaw/web-search:latest
platform: docker
scopes:
- net.outbound:api.openclaw.example.com
- files.read:/tmp/allowed
signature: "ed25519:..." # optional signed skill verificationRegister the skill with AegisClaw (if you keep skills in a local registry or the config directory):
# copy manifest into the skills directory used by AegisClaw
mkdir -p ~/.aegisclaw/skills
cp skills/web-search.yaml ~/.aegisclaw/skills/- Run the skill with AegisClaw's hardened runtime
# Run a registered skill inside the sandbox (example)
./aegisclaw sandbox run-registered web-searchIf your deployment runs an external OpenClaw service (instead of containerized skills), ensure AegisClaw's adapter will only allow the necessary egress and that API keys are provided via the secret name in the adapter config. All adapter actions are recorded in AegisClaw's audit log.
Security & Policies
- Use least-privilege scopes for skills (e.g.,
files.read:/specific/pathrather thanfiles.read:/). - Require skill signing and verify signatures for production skills.
- Use the TUI approval flow for any skill that requests high-risk scopes.
Troubleshooting
- If a skill cannot reach the OpenClaw endpoint, check the egress proxy/egress rules and the adapter
endpointsetting. - Check adapter status directly:
curl http://127.0.0.1:8080/api/openclaw/health - Verify secrets are present:
./aegisclaw secrets list - Inspect audit logs for denied actions:
./aegisclaw logs
- v0.1.x (Foundations): CLI, Policy Engine, TUI Approval, Hardened Docker,
ageSecrets, Audit Logging, OpenClaw Adapter, Egress Proxy, Signed Skills. - v0.2.x (Policy & Runtimes): OPA (Rego) policy engine integration, gVisor (
sandbox_runtime) support. - v0.3.x (Observability & UX): Modern Web Dashboard, Real-time Terminal Streaming, Prometheus Metrics, OpenTelemetry Tracing, Active Secret Redaction, Emergency Lockdown (Panic Button).
- Package Manager Distribution: Cross-platform install script, goreleaser with Windows builds.
- Interactive Init Wizard: Guided first-run setup with environment detection (Docker, gVisor) and policy selection.
- Starter Skill Packs: Pre-built skills (file-organiser, code-runner, git-stats) with Dockerfiles and manifests.
-
aegisclaw doctor: Single command to diagnose setup β OpenClaw adapter health, Docker, secrets, audit integrity, policy engine, disk space. - Docker-Compose Orchestration: Multi-container skills with per-service scopes and isolated networks.
- Notification System: Webhook and Slack alerts for pending approvals, denied actions, and emergencies.
- Policy Templates & Shell Completions: Strict/standard/permissive Rego templates; bash/zsh/fish completions.
- Kata Containers / Firecracker: MicroVM-based isolation with pluggable runtime interface.
- Pluggable Vault Backends: HashiCorp Vault KV v2 with Store interface for future backends.
- LLM Guardrails: Prompt injection detection, jailbreak prevention, secret leak sanitization.
- Runtime Behaviour Profiling: Learn normal skill behaviour, flag anomalies (new network targets, memory/CPU spikes).
- Auth & Access Control: RBAC roles (admin/operator/viewer), API token auth with constant-time comparison.
- Live Threat Map Dashboard: WebSocket hub for real-time event streaming (audit, lockdown, posture).
- Agent X-Ray Mode: Deep inspection of running skills (CPU, memory, network, processes via Docker API).
- Security Posture Score: Gamified scoring of configuration quality with CLI badge (AβF grading).
- MCP Server: Expose AegisClaw as an MCP tool for AI assistants (stdio transport).
- Skill Marketplace: Local registry with ratings, security badges, search, and caching.
- VS Code Extension: Sidebar panel for status, audit stream, skills, and Rego snippets.
-
aegisclaw simulate: Dry-run mode predicting skill behaviour without execution.
- eBPF Runtime Monitoring: Kernel-level event tracing (syscalls, files, network) for deep observability (currently active on Linux x86 targets).
- Multi-Node Orchestration: Distributed cluster with leader/follower roles, audit forwarding, and policy sync.
- AegisClaw Cloud: Multi-tenant SaaS with org/team hierarchy, managed registry, and hosted dashboards.
- AI-Powered Policies: LLM-assisted minimal-scope generation and behavior anomaly detection.
We welcome contributions! Please see our CONTRIBUTING.md for details on how to get started.
Apache 2.0 - See LICENSE for details.
Repository Topics: security, agent-runtime, sandbox, golang, ai-safety, docker, seccomp



