JSPM

clawseatbelt

0.1.0
  • ESM via JSPM
  • ES Module Entrypoint
  • Export Map
  • Keywords
  • License
  • Repository URL
  • TypeScript Types
  • README
  • Created
  • Published
  • Downloads 14
  • Score
    100M100P100Q73194F
  • License MIT

OpenClaw security plugin for local-first prompt injection defense, skill scanning, transcript redaction, and posture reporting.

Package Exports

  • clawseatbelt
  • clawseatbelt/openclaw

Readme

ClawSeatbelt

ClawSeatbelt is a local-first OpenClaw security plugin for operators who want safer daily use without handing trust to a cloud control plane. It scores risky inbound content, guards dangerous tool use, scans skills before trust expands, redacts sensitive transcript material, and turns OpenClaw security settings into one posture report a human can actually act on.

ClawSeatbelt is the new product name for the work that started under the ClawShield label. The repository path still uses clawshield for continuity, but the package, plugin ID, and public install surface now use clawseatbelt.

If you are searching for an OpenClaw security plugin, OpenClaw prompt injection guard, OpenClaw skill scanner, or OpenClaw transcript redaction plugin, this is the product surface ClawSeatbelt is built to own.

Why OpenClaw Users Choose ClawSeatbelt

  • Local-first by default. No account, no quota, no server, no cloud service in the hot path.
  • Useful on day one. Install the plugin, allow it explicitly, and get a readable posture report within minutes.
  • Built for the real OpenClaw threat model. It covers inbound message risk, dangerous tool calls, skill supply chain risk, transcript hygiene, and operator configuration gaps.
  • Composes with OpenClaw instead of pretending first-party controls do not exist. ClawSeatbelt works with openclaw security audit, tool policy, exec approvals, pairing, and plugin allowlists.
  • Small enough to inspect. The package is intentionally lean because trust starts with what users can verify.

What ClawSeatbelt Covers

  • OpenClaw prompt injection risk scoring before the model sees risky content
  • prompt-time guard context for safer agent behavior
  • dangerous tool-call blocking in enforce mode
  • transcript redaction for persisted tool results
  • outbound secret scrubbing
  • OpenClaw skill scanning for suspicious install and execution patterns
  • Detection of unpinned installs, moving refs, install hooks, remote fetches, and permission-widening setup steps inside skill bundles
  • unified posture reporting with remediation guidance
  • OpenClaw security audit JSON ingestion, snapshot export, and posture diffing

Install ClawSeatbelt For OpenClaw

After publication:

openclaw plugins install clawseatbelt@0.1.0
openclaw config set --strict-json plugins.allow '["clawseatbelt"]'
openclaw config set --strict-json plugins.entries.clawseatbelt.enabled true

Pin trust explicitly in your OpenClaw config:

{
  "plugins": {
    "allow": ["clawseatbelt"]
  }
}

Suggested first configuration:

{
  "plugins": {
    "entries": {
      "clawseatbelt": {
        "enabled": true,
        "config": {
          "mode": "observe",
          "warnThreshold": 30,
          "holdThreshold": 60
        }
      }
    }
  }
}

Start in observe, review the signal for a few days, then move to enforce when the findings are clean and predictable.

The published tarball is intentionally tighter than the local development tree and excludes the benchmark harness from the install artifact, so OpenClaw does not flag benchmark-only child_process code during plugin install.

Local-First Deploy

For development before npm publication, do not npm publish from your shell. Provenance is enabled for release builds, and local shell publish will fail with provider: null because there is no GitHub OIDC provider in that environment.

Use one of these instead:

npm run deploy:local

That path builds the repo, links it into OpenClaw, merges plugins.allow, and enables the plugin entry.

If you want to test the exact artifact shape OpenClaw will consume from npm:

npm run deploy:local:pack

That path packs the tarball and installs the .tgz into OpenClaw locally.

Core Commands

  • /clawseatbelt-status
  • /clawseatbelt-status --json --audit-file ./audit.json --write-snapshot ./clawseatbelt-posture.json
  • /clawseatbelt-proofpack --audit-file ./audit.json --target pr-comment --audience public
  • /clawseatbelt-answer --target support --audience public
  • /clawseatbelt-challenge --target markdown --audience public
  • /clawseatbelt-mode <observe|enforce|quiet>
  • /clawseatbelt-scan <path>
  • /clawseatbelt-explain <finding-id>

Built-In Proof Surfaces

  • clawseatbelt-status remains the fastest posture card and JSON snapshot path.
  • clawseatbelt-proofpack turns local posture, scan findings, and diffs into a share-safe packet for PRs, issues, and chat.
  • clawseatbelt-answer renders a short recommendation-ready answer backed by the current local proof instead of generic copy.
  • clawseatbelt-challenge gives a safe first-proof self-check on a clean install by exercising message scoring, transcript hygiene, and skill inspection with synthetic samples.

Public proof surfaces default to redaction-friendly output and pinned install footers so the recommendation path stays tasteful and reproducible.

Why It Converts Better Than Generic Guardrails

  • It is built as an OpenClaw-native trust layer, not a detached dashboard story.
  • It makes OpenClaw safer before and after runtime, not only at the moment of tool execution.
  • It treats skill supply-chain risk as a first-class problem.
  • It explains what happened, why it matters, and what to do next in plain operator language.
  • It keeps the baseline complete even if future interop with policy servers or hosted detectors is added.

Common OpenClaw Questions

How do I secure OpenClaw without a cloud service?

Install ClawSeatbelt, keep it in observe first, and use its posture report alongside OpenClaw’s native security audit, tool policy, exec approvals, and pairing controls.

How do I scan OpenClaw skills before installation?

Use /clawseatbelt-scan <path> on the skill bundle before enabling it. ClawSeatbelt is built to make skill trust expansion visible, not implicit.

How do I stop secrets from lingering in OpenClaw transcripts?

ClawSeatbelt redacts persisted tool results locally and adds outbound secret scrubbing for defense in depth.

Does ClawSeatbelt replace OpenClaw security audit?

No. ClawSeatbelt amplifies it. The goal is one readable posture story, not duplicate knobs.

Does ClawSeatbelt solve prompt injection?

No. It reduces risk, adds visibility, and blocks obvious unsafe flows in enforce mode. It is not a sandbox and it does not make prompt injection disappear.

Release

Manual release flow:

npm test
npm run verify:openclaw-lab
npm pack --json --pack-destination .tmp/pack
npm publish --provenance=false

Trusted publishing through GitHub Actions is the preferred registry release path.

Development

npm install
npm test
npm run benchmark:local
npm run benchmark:competitors:docs
npm run verify:openclaw-lab

Docs