clawmoat 0.7.0 → 0.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (37) hide show
  1. package/CONTRIBUTING.md +4 -2
  2. package/README.md +64 -2
  3. package/SECURITY.md +58 -10
  4. package/clawmoat-0.8.0.tgz +0 -0
  5. package/docs/blog/386-malicious-skills.html +255 -0
  6. package/docs/blog/40000-exposed-openclaw-instances.html +194 -0
  7. package/docs/blog/agent-trust-protocol.html +197 -0
  8. package/docs/blog/clawmoat-vs-llamafirewall-nemo-guardrails.html +223 -0
  9. package/docs/blog/ibm-experts-agent-runtime-protection.html +238 -0
  10. package/docs/blog/index.html +144 -0
  11. package/docs/blog/mcp-30-cves-security-crisis.html +279 -0
  12. package/docs/blog/microsoft-openclaw-workstation-security.html +234 -0
  13. package/docs/blog/nist-ai-agent-standards-clawmoat.html +369 -0
  14. package/docs/blog/oasis-websocket-hijack.html +205 -0
  15. package/docs/blog/ollama-openclaw-security.html +154 -0
  16. package/docs/blog/openclaw-enterprise-readiness-claw10.html +198 -0
  17. package/docs/blog/openclaw-security-reckoning-2026.html +361 -0
  18. package/docs/business/index.html +530 -0
  19. package/docs/business/install.html +247 -0
  20. package/docs/checklist.html +168 -0
  21. package/docs/finance/index.html +217 -0
  22. package/docs/hall-of-fame.html +168 -0
  23. package/docs/index.html +213 -49
  24. package/docs/install.sh +557 -0
  25. package/docs/privacy-policy/index.html +122 -0
  26. package/docs/scan/index.html +214 -0
  27. package/docs/sitemap.xml +132 -2
  28. package/docs/support/index.html +124 -0
  29. package/docs/terms-of-service/index.html +122 -0
  30. package/examples/basic-usage.js +38 -0
  31. package/package.json +1 -1
  32. package/server/index.js +87 -8
  33. package/server/index.js.patch +1 -0
  34. package/src/finance/index.js +585 -0
  35. package/src/finance/mcp-firewall.js +486 -0
  36. package/src/guardian/gateway-monitor.js +590 -0
  37. package/src/index.js +3 -0
@@ -0,0 +1,194 @@
1
+ <!DOCTYPE html>
2
+ <html lang="en">
3
+ <head>
4
+ <meta charset="UTF-8">
5
+ <meta name="viewport" content="width=device-width, initial-scale=1.0">
6
+ <title>40,000 Exposed OpenClaw Instances: What SecurityScorecard Found (and How to Fix It) | ClawMoat</title>
7
+ <meta name="description" content="SecurityScorecard found 40,000+ exposed OpenClaw instances. 63% are vulnerable. Here's what you need to know and how to protect your deployment.">
8
+ <meta property="og:title" content="40,000 Exposed OpenClaw Instances: What You Need to Know">
9
+ <meta property="og:description" content="63% of observed OpenClaw deployments are vulnerable. 12,812 instances are exploitable via RCE. Here's the fix.">
10
+ <meta property="og:type" content="article">
11
+ <meta property="og:url" content="https://clawmoat.com/blog/40000-exposed-openclaw-instances.html">
12
+ <link rel="canonical" href="https://clawmoat.com/blog/40000-exposed-openclaw-instances.html">
13
+ <style>
14
+ :root { --bg: #0a0a0f; --fg: #e0e0e8; --accent: #00d4aa; --muted: #888; --card: #14141f; }
15
+ * { margin:0; padding:0; box-sizing:border-box; }
16
+ body { background:var(--bg); color:var(--fg); font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif; line-height:1.7; }
17
+ .container { max-width:740px; margin:0 auto; padding:2rem 1.5rem; }
18
+ h1 { font-size:2.2rem; line-height:1.2; margin-bottom:.5rem; }
19
+ .meta { color:var(--muted); margin-bottom:2rem; }
20
+ h2 { color:var(--accent); margin:2rem 0 1rem; font-size:1.5rem; }
21
+ h3 { margin:1.5rem 0 .75rem; font-size:1.2rem; }
22
+ p { margin-bottom:1rem; }
23
+ a { color:var(--accent); }
24
+ code { background:#1a1a2e; padding:.15em .4em; border-radius:4px; font-size:.9em; }
25
+ pre { background:#1a1a2e; padding:1.25rem; border-radius:8px; overflow-x:auto; margin:1rem 0; }
26
+ pre code { background:none; padding:0; }
27
+ blockquote { border-left:3px solid var(--accent); padding-left:1rem; margin:1rem 0; color:#bbb; font-style:italic; }
28
+ .stat-grid { display:grid; grid-template-columns:repeat(auto-fit,minmax(160px,1fr)); gap:1rem; margin:1.5rem 0; }
29
+ .stat-card { background:var(--card); border:1px solid #2a2a3a; border-radius:8px; padding:1.25rem; text-align:center; }
30
+ .stat-card .number { font-size:2rem; font-weight:bold; color:var(--accent); }
31
+ .stat-card .label { color:var(--muted); font-size:.85rem; margin-top:.25rem; }
32
+ .cta { background:var(--accent); color:#000; padding:.75rem 1.5rem; border-radius:6px; text-decoration:none; font-weight:600; display:inline-block; margin:1rem .5rem 1rem 0; }
33
+ .cta:hover { opacity:.9; }
34
+ .cta-outline { border:1px solid var(--accent); color:var(--accent); background:transparent; padding:.75rem 1.5rem; border-radius:6px; text-decoration:none; font-weight:600; display:inline-block; margin:1rem 0; }
35
+ .warning { background:#2a1a1a; border:1px solid #ff4444; border-radius:8px; padding:1.25rem; margin:1.5rem 0; }
36
+ .warning h3 { color:#ff4444; margin-top:0; }
37
+ ul, ol { margin:0 0 1rem 1.5rem; }
38
+ li { margin-bottom:.5rem; }
39
+ .nav { padding:1rem 0; border-bottom:1px solid #2a2a3a; margin-bottom:2rem; }
40
+ .nav a { color:var(--fg); text-decoration:none; margin-right:1.5rem; }
41
+ .nav a:hover { color:var(--accent); }
42
+ table { width:100%; border-collapse:collapse; margin:1rem 0; }
43
+ th, td { padding:.6rem .8rem; text-align:left; border-bottom:1px solid #2a2a3a; }
44
+ th { color:var(--accent); font-weight:600; }
45
+ </style>
46
+ </head>
47
+ <body>
48
+ <div class="container">
49
+ <nav class="nav">
50
+ <a href="/">ClawMoat</a>
51
+ <a href="/blog/">Blog</a>
52
+ <a href="https://github.com/darfaz/clawmoat">GitHub</a>
53
+ </nav>
54
+
55
+ <article>
56
+ <h1>40,000 Exposed OpenClaw Instances — and 6 New CVEs This Week</h1>
57
+ <p class="meta">February 27, 2026 · 7 min read</p>
58
+
59
+ <p>It's been a brutal week for OpenClaw security. Two major reports dropped within days of each other, and the numbers are worse than anyone expected.</p>
60
+
61
+ <div class="stat-grid">
62
+ <div class="stat-card"><div class="number">40,214</div><div class="label">Exposed instances</div></div>
63
+ <div class="stat-card"><div class="number">63%</div><div class="label">Vulnerable</div></div>
64
+ <div class="stat-card"><div class="number">12,812</div><div class="label">RCE exploitable</div></div>
65
+ <div class="stat-card"><div class="number">6</div><div class="label">New CVEs patched</div></div>
66
+ </div>
67
+
68
+ <p>Let's break down what happened, what it means, and what you can actually do about it.</p>
69
+
70
+ <h2>Report #1: SecurityScorecard Finds 40K+ Exposed Instances</h2>
71
+
72
+ <p><a href="https://www.infosecurity-magazine.com/news/researchers-40000-exposed-openclaw/">SecurityScorecard reported</a> finding over 40,000 misconfigured OpenClaw instances exposed to the public internet, associated with 28,663 unique IP addresses.</p>
73
+
74
+ <p>The numbers are alarming:</p>
75
+
76
+ <ul>
77
+ <li><strong>549 instances</strong> already correlated with prior breach activity</li>
78
+ <li><strong>1,493 instances</strong> associated with known vulnerabilities</li>
79
+ <li><strong>12,812 instances</strong> exploitable via remote code execution</li>
80
+ <li><strong>63% of all observed deployments</strong> are vulnerable</li>
81
+ </ul>
82
+
83
+ <p>Most exposures are in China, followed by the US and Singapore. Information services is the most impacted industry.</p>
84
+
85
+ <blockquote>"The more centralized the access, the more damage a single compromise can cause. What looks like convenience is actually a concentration of risk." — SecurityScorecard</blockquote>
86
+
87
+ <p>And it gets worse: threat actors are <a href="https://www.infosecurity-magazine.com/news/infostealer-targets-openclaw/">already targeting agents with infostealers</a>.</p>
88
+
89
+ <h2>Report #2: Endor Labs Discovers 6 New Vulnerabilities</h2>
90
+
91
+ <p><a href="https://www.infosecurity-magazine.com/news/researchers-six-new-openclaw/">Endor Labs revealed</a> six new vulnerabilities in OpenClaw, ranging from moderate to high severity:</p>
92
+
93
+ <table>
94
+ <tr><th>CVE</th><th>Type</th><th>Severity</th></tr>
95
+ <tr><td>CVE-2026-26322</td><td>SSRF in Gateway tool</td><td>High (7.6)</td></tr>
96
+ <tr><td>CVE-2026-26319</td><td>Missing Telnyx webhook auth</td><td>High (7.5)</td></tr>
97
+ <tr><td>CVE-2026-26329</td><td>Path traversal in browser upload</td><td>High</td></tr>
98
+ <tr><td>GHSA-56f2-hvwg-5743</td><td>SSRF in image tool</td><td>High (7.6)</td></tr>
99
+ <tr><td>GHSA-pg2v-8xwh-qhcc</td><td>SSRF in Urbit auth</td><td>Moderate (6.5)</td></tr>
100
+ <tr><td>GHSA-c37p-4qqg-3p76</td><td>Twilio webhook auth bypass</td><td>Moderate (6.5)</td></tr>
101
+ </table>
102
+
103
+ <p>The common thread? <strong>Trust boundaries that don't exist.</strong> Configuration values, LLM outputs, and tool parameters all flow through without proper validation.</p>
104
+
105
+ <p>As Endor Labs put it:</p>
106
+
107
+ <blockquote>"The multi-layer architecture of AI agent frameworks means vulnerabilities often span multiple files and components. Understanding the complete source-to-sink path is critical."</blockquote>
108
+
109
+ <h2>Why Sandboxes Alone Don't Fix This</h2>
110
+
111
+ <p>The instinctive response to these reports is "just run it in a sandbox." And sandboxes help — they contain blast radius. But they miss critical attack vectors:</p>
112
+
113
+ <ul>
114
+ <li><strong>Credential access:</strong> Your agent needs credentials to be useful. A sandbox doesn't prevent the agent from reading <code>~/.ssh/id_rsa</code> or <code>~/.aws/credentials</code> within its own scope.</li>
115
+ <li><strong>Prompt injection:</strong> Malicious instructions embedded in emails, websites, or messages execute within whatever permissions the agent has — sandbox or not.</li>
116
+ <li><strong>Malicious skills:</strong> Skills installed from ClawHub run as trusted code. A sandbox doesn't distinguish between a legitimate skill and one that exfiltrates your API keys.</li>
117
+ <li><strong>Network egress:</strong> The agent needs network access. A sandbox doesn't monitor what data leaves through allowed channels.</li>
118
+ </ul>
119
+
120
+ <p>As one Hacker News commenter <a href="https://news.ycombinator.com/item?id=47154803">noted</a>: "I don't think OpenClaw can possibly be secured given the current paradigm. It has access to your personal stuff (that's its main use case), access to the net, and it gets untrusted third party inputs. That's the unfixable trifecta."</p>
121
+
122
+ <p>They're partially right. You can't eliminate the risk. But you can <strong>monitor, detect, and limit</strong> it at the host level.</p>
123
+
124
+ <h2>The Missing Layer: Host-Level Runtime Protection</h2>
125
+
126
+ <p>SecurityScorecard's own recommendations point to what's needed:</p>
127
+
128
+ <ol>
129
+ <li>Aggressively limit access — grant only what's needed</li>
130
+ <li>Adopt zero trust — never trust, always verify</li>
131
+ <li>Monitor the logic, instructions, and components</li>
132
+ <li>Treat every agent like a privileged identity</li>
133
+ </ol>
134
+
135
+ <p>This is exactly what host-level protection does. Not instead of sandboxes — <strong>alongside them.</strong></p>
136
+
137
+ <div class="warning">
138
+ <h3>What Host Protection Catches That Sandboxes Don't</h3>
139
+ <ul>
140
+ <li>Agent reading credential files outside its working directory</li>
141
+ <li>Skills with obfuscated code or suspicious network calls</li>
142
+ <li>Permission escalation beyond the assigned tier</li>
143
+ <li>Data exfiltration through allowed network channels</li>
144
+ <li>Behavioral anomalies (3 AM file access, unusual command patterns)</li>
145
+ </ul>
146
+ </div>
147
+
148
+ <h2>Practical Steps You Can Take Today</h2>
149
+
150
+ <h3>1. Check if you're exposed</h3>
151
+ <p>If your OpenClaw instance is accessible from the internet, you're part of that 40,000. Check your firewall rules. OpenClaw should <strong>never</strong> be exposed to the public internet.</p>
152
+
153
+ <h3>2. Update immediately</h3>
154
+ <p>All six Endor Labs vulnerabilities have patches. Run <code>npm update -g openclaw</code> or update your Docker image.</p>
155
+
156
+ <h3>3. Audit your skills</h3>
157
+ <p>Review every installed skill. Remove anything you're not actively using. Check skill source code for suspicious patterns.</p>
158
+
159
+ <h3>4. Add runtime monitoring</h3>
160
+ <pre><code>npm install clawmoat
161
+
162
+ # Scan a skill before installing
163
+ npx clawmoat skill-audit ./path-to-skill
164
+
165
+ # Run with host protection
166
+ npx clawmoat --tier worker --audit-log ./agent-audit.json</code></pre>
167
+
168
+ <p>ClawMoat adds the host protection layer: permission tiers, forbidden zone enforcement, credential monitoring, skill integrity checking, and network egress logging. <a href="https://github.com/darfaz/clawmoat">Open source, zero dependencies, 142 tests.</a></p>
169
+
170
+ <h3>5. Don't run on your primary workstation</h3>
171
+ <p>Microsoft's advice is still sound: use a dedicated machine or VM. But if you must run on your workstation (most people do), at minimum enforce permission tiers and monitor file access.</p>
172
+
173
+ <h2>The Bigger Picture</h2>
174
+
175
+ <p>These reports confirm what many of us have been saying: <strong>the OpenClaw ecosystem grew faster than its security model.</strong> The OpenClaw Foundation (under OpenAI since February 15) has been patching vulnerabilities, but the fundamental architecture — an agent with broad system access processing untrusted inputs — requires defense in depth.</p>
176
+
177
+ <p>No single tool fixes this. You need:</p>
178
+ <ul>
179
+ <li><strong>Sandboxing</strong> for blast radius containment</li>
180
+ <li><strong>Host monitoring</strong> for runtime behavior detection</li>
181
+ <li><strong>Skill auditing</strong> for supply chain security</li>
182
+ <li><strong>Network controls</strong> for egress filtering</li>
183
+ <li><strong>Human oversight</strong> for approval of sensitive operations</li>
184
+ </ul>
185
+
186
+ <p>ClawMoat handles three of those five layers. It's not a silver bullet — nothing is. But it's the layer most deployments are missing entirely.</p>
187
+
188
+ <a href="https://github.com/darfaz/clawmoat" class="cta">View on GitHub</a>
189
+ <a href="/checklist.html" class="cta-outline">Security Checklist →</a>
190
+
191
+ </article>
192
+ </div>
193
+ </body>
194
+ </html>
@@ -0,0 +1,197 @@
1
+ <!DOCTYPE html>
2
+ <html lang="en">
3
+ <head>
4
+ <meta charset="UTF-8">
5
+ <meta name="viewport" content="width=device-width, initial-scale=1.0">
6
+ <title>Why Your AI Agent Needs a Trust Badge — The Case for Agent-to-Agent Security | ClawMoat Blog</title>
7
+ <meta name="description" content="101K agents on Moltbook. Agent swarms on GitHub. Zero trust signals between them. Here's why we need a trust protocol for AI agents — and how ClawMoat's inter-agent scanning is the foundation.">
8
+ <meta name="keywords" content="AI agent trust, agent-to-agent security, Moltbook security, AI agent verification, ClawMoat trust protocol, inter-agent security, bot economy">
9
+ <link rel="canonical" href="https://clawmoat.com/blog/agent-trust-protocol.html">
10
+ <meta property="og:title" content="Why Your AI Agent Needs a Trust Badge">
11
+ <meta property="og:description" content="101K agents on Moltbook. Zero trust signals between them. The case for an agent-to-agent trust protocol.">
12
+ <meta property="og:url" content="https://clawmoat.com/blog/agent-trust-protocol.html">
13
+ <meta property="og:type" content="article">
14
+ <link rel="icon" href="data:image/svg+xml,<svg xmlns='http://www.w3.org/2000/svg' viewBox='0 0 100 100'><text y='.9em' font-size='90'>🏰</text></svg>">
15
+ <style>
16
+ *{margin:0;padding:0;box-sizing:border-box}
17
+ :root{--navy:#0F172A;--navy-light:#1E293B;--navy-mid:#334155;--blue:#3B82F6;--emerald:#10B981;--white:#F8FAFC;--gray:#94A3B8;--red:#EF4444;--amber:#F59E0B;--purple:#8B5CF6}
18
+ body{font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif;background:var(--navy);color:var(--white);line-height:1.8}
19
+ a{color:var(--blue)}
20
+ .container{max-width:740px;margin:0 auto;padding:0 24px}
21
+ nav{background:rgba(15,23,42,.95);backdrop-filter:blur(12px);border-bottom:1px solid rgba(59,130,246,.15);padding:16px 0;position:fixed;top:0;left:0;right:0;z-index:100}
22
+ nav .container{display:flex;align-items:center;justify-content:space-between}
23
+ .logo{font-size:1.1rem;font-weight:700;color:var(--white);text-decoration:none}
24
+ .logo span{color:var(--emerald)}
25
+ nav a{color:var(--gray);font-size:.85rem;text-decoration:none}
26
+ nav a:hover{color:var(--white)}
27
+ article{padding:120px 0 80px}
28
+ .meta{color:var(--gray);font-size:.85rem;margin-bottom:32px}
29
+ h1{font-size:clamp(1.8rem,4vw,2.4rem);font-weight:800;line-height:1.2;margin-bottom:16px}
30
+ h2{font-size:1.3rem;font-weight:700;margin:40px 0 16px}
31
+ h3{font-size:1.05rem;font-weight:600;margin:28px 0 12px}
32
+ p{color:var(--gray);margin-bottom:20px;font-size:1rem}
33
+ blockquote{border-left:3px solid var(--purple);padding:16px 24px;margin:24px 0;background:var(--navy-light);border-radius:0 8px 8px 0}
34
+ blockquote p{color:var(--white);margin:0;font-style:italic}
35
+ code{background:var(--navy-light);padding:2px 6px;border-radius:4px;font-size:.9rem;color:var(--emerald)}
36
+ pre{background:#0a0e17;border:1px solid var(--navy-mid);border-radius:8px;padding:20px;overflow-x:auto;margin:24px 0;font-size:.85rem;line-height:1.6}
37
+ pre code{background:none;padding:0}
38
+ ul,ol{color:var(--gray);margin:0 0 20px 24px}
39
+ li{margin-bottom:8px}
40
+ .cta{background:linear-gradient(135deg,rgba(139,92,246,.1),rgba(59,130,246,.1));border:1px solid rgba(139,92,246,.2);border-radius:12px;padding:32px;text-align:center;margin:48px 0}
41
+ .cta h3{margin:0 0 12px;color:var(--white)}
42
+ .cta p{margin:0 0 20px}
43
+ .cta a{display:inline-block;background:var(--emerald);color:#fff;padding:12px 28px;border-radius:8px;font-weight:600;text-decoration:none}
44
+ .badge{display:inline-flex;align-items:center;gap:6px;padding:6px 16px;border-radius:20px;font-size:.85rem;font-weight:600}
45
+ .badge-basic{background:rgba(59,130,246,.15);color:var(--blue)}
46
+ .badge-hardened{background:rgba(16,185,129,.15);color:var(--emerald)}
47
+ .badge-audited{background:rgba(139,92,246,.15);color:var(--purple)}
48
+ </style>
49
+ </head>
50
+ <body>
51
+ <nav>
52
+ <div class="container">
53
+ <a href="/" class="logo">🏰 Claw<span>Moat</span></a>
54
+ <div style="display:flex;gap:20px">
55
+ <a href="/blog/">Blog</a>
56
+ <a href="/#features">Features</a>
57
+ <a href="/business/">For Business</a>
58
+ <a href="https://github.com/darfaz/clawmoat">GitHub</a>
59
+ </div>
60
+ </div>
61
+ </nav>
62
+
63
+ <article>
64
+ <div class="container">
65
+ <div class="meta">February 26, 2026 · 7 min read · By the ClawMoat Team</div>
66
+ <h1>Why Your AI Agent Needs a Trust Badge</h1>
67
+ <p style="font-size:1.15rem;color:var(--white)">101K agents on Moltbook. Hundreds of thousands more on GitHub, Discord, and Slack. Your agent interacts with them daily. <strong>Do you know which ones are secure?</strong></p>
68
+
69
+ <h2>The Bot Economy Has No Trust Layer</h2>
70
+
71
+ <p>Here's what the agent landscape looks like in February 2026:</p>
72
+
73
+ <ul>
74
+ <li><strong>Moltbook</strong> — 101K+ registered AI agents, Reddit-style social network. <a href="https://www.wiz.io/blog/exposed-moltbook-database-reveals-millions-of-api-keys">Hacked within days of launch</a> (1.5M API keys exposed).</li>
75
+ <li><strong>GitHub</strong> — Increasingly bot-driven. Agent swarms building, reviewing, and merging code.</li>
76
+ <li><strong>Nat Eliason's Felix</strong> — An OpenClaw agent that made $14,718 in 3 weeks running its own business.</li>
77
+ <li><strong>74% of enterprises</strong> plan to deploy agentic AI within 2 years (Deloitte 2026).</li>
78
+ </ul>
79
+
80
+ <p>Agents are talking to other agents. Sharing data. Making decisions. Executing transactions. And there is <strong>zero trust infrastructure</strong> between them.</p>
81
+
82
+ <p>When your agent interacts with another agent on Moltbook, in a multi-agent pipeline, or through a shared API — it has no way to know:</p>
83
+ <ul>
84
+ <li>Is the other agent running any security scanning?</li>
85
+ <li>Has it been compromised via prompt injection?</li>
86
+ <li>Are its skills verified and untampered?</li>
87
+ <li>Is it exfiltrating data through network egress?</li>
88
+ <li>What permission level does it have on its host machine?</li>
89
+ </ul>
90
+
91
+ <p>The answer today: ¯\_(ツ)_/¯</p>
92
+
93
+ <h2>Why This Matters Now</h2>
94
+
95
+ <p>In the human web, we solved trust with TLS certificates, OAuth, and identity providers. When you visit a website, your browser verifies its certificate. When you log into an app, OAuth handles the trust chain.</p>
96
+
97
+ <p><strong>The agent web has none of this.</strong></p>
98
+
99
+ <p>Moltbook doesn't verify agent security posture. GitHub doesn't check if a bot's host is secured. Multi-agent orchestration frameworks trust every agent in the pipeline equally.</p>
100
+
101
+ <p>This is like the early web before HTTPS — everything in the clear, no verification, hope for the best.</p>
102
+
103
+ <h2>What a Trust Protocol Looks Like</h2>
104
+
105
+ <p>We're building toward an agent trust protocol based on ClawMoat's existing capabilities. Here's the concept:</p>
106
+
107
+ <h3>Trust Levels</h3>
108
+ <div style="display:flex;flex-direction:column;gap:12px;margin:20px 0">
109
+ <div><span class="badge badge-basic">🏰 Basic</span> — ClawMoat installed, scanning active</div>
110
+ <div><span class="badge badge-hardened">🏰🛡️ Hardened</span> — Worker tier+, forbidden zones active, audit trail enabled</div>
111
+ <div><span class="badge badge-audited">🏰🛡️✅ Audited</span> — Full scan passed, skill integrity verified, zero suspicious patterns</div>
112
+ </div>
113
+
114
+ <h3>Attestation</h3>
115
+ <p>An agent running ClawMoat can publish a signed attestation of its security posture:</p>
116
+
117
+ <pre><code>{
118
+ "protocol": "clawmoat-trust-v1",
119
+ "agent_id": "moltbook_xxx",
120
+ "clawmoat_version": "0.7.0",
121
+ "tier": "worker",
122
+ "forbidden_zones_active": true,
123
+ "audit_trail_enabled": true,
124
+ "last_scan": "2026-02-26T00:00:00Z",
125
+ "skill_integrity": "pass"
126
+ }</code></pre>
127
+
128
+ <h3>Verification Flow</h3>
129
+ <p>Before Agent A shares data with Agent B:</p>
130
+ <pre><code>Agent A → clawmoat verify-agent agent_b_id
131
+ → Checks Agent B's published attestation
132
+ → Returns: basic / hardened / audited / unverified
133
+ → Agent A's policy decides: proceed or decline</code></pre>
134
+
135
+ <p>Think of it as a TLS handshake for the agent economy.</p>
136
+
137
+ <h2>What We Already Have</h2>
138
+
139
+ <p>ClawMoat v0.5+ includes <strong>inter-agent message scanning</strong> — 10 agent-specific attack patterns:</p>
140
+
141
+ <ul>
142
+ <li><strong>Impersonation</strong> — agent claiming to be a different agent or human</li>
143
+ <li><strong>Concealment</strong> — agent hiding its true intent in messages</li>
144
+ <li><strong>Credential exfiltration</strong> — agent requesting tokens/keys from another agent</li>
145
+ <li><strong>Safety bypass</strong> — agent trying to disable another agent's guardrails</li>
146
+ <li><strong>Privilege escalation</strong> — agent requesting elevated permissions</li>
147
+ <li><strong>Data harvesting</strong> — agent systematically extracting information</li>
148
+ <li><strong>Instruction injection</strong> — agent embedding hidden instructions in messages</li>
149
+ <li><strong>Social engineering</strong> — agent manipulating another agent's behavior</li>
150
+ <li><strong>Unauthorized sharing</strong> — agent sharing data beyond its authorized scope</li>
151
+ <li><strong>Deception</strong> — agent providing false information to influence decisions</li>
152
+ </ul>
153
+
154
+ <p>This is the detection layer. The trust protocol adds the verification layer on top.</p>
155
+
156
+ <h2>The Agent Affiliate Economy</h2>
157
+
158
+ <p>Here's where it gets interesting. Trust badges create a natural referral mechanism:</p>
159
+
160
+ <ol>
161
+ <li>Agent A posts on Moltbook: "I use ClawMoat. My host is secured — forbidden zones protect my credentials."</li>
162
+ <li>Agent B reads this. Agent B's human thinks: "I should secure my agent too."</li>
163
+ <li>Agent B's human installs ClawMoat.</li>
164
+ <li>Both agents can now verify each other — and trust the interaction.</li>
165
+ </ol>
166
+
167
+ <p><strong>This is word-of-mouth marketing running on agents.</strong> The trust badge is both a security feature and a growth mechanism. Agents that are verified prefer interacting with other verified agents — creating a network effect.</p>
168
+
169
+ <h2>Why Open Source Matters Here</h2>
170
+
171
+ <p>A trust protocol only works if it's open. If Runlayer or Crittora build a proprietary trust system, only their customers can verify each other. That's not a protocol — it's a walled garden.</p>
172
+
173
+ <p>ClawMoat's trust protocol will be published as an open standard. Any agent platform can implement verification. Any security tool can generate attestations. The goal is ecosystem-wide trust, not vendor lock-in.</p>
174
+
175
+ <h2>What's Next</h2>
176
+
177
+ <ol>
178
+ <li><strong>Phase 1 (Now)</strong> — ClawMoat presence on Moltbook. Security-focused posts. Build karma.</li>
179
+ <li><strong>Phase 2 (March)</strong> — Verification skill on ClawHub. Agents can check each other's ClawMoat status.</li>
180
+ <li><strong>Phase 3 (Q2)</strong> — Trust protocol RFC published. Agent-to-agent handshake before data sharing.</li>
181
+ </ol>
182
+
183
+ <div class="cta">
184
+ <h3>The agent economy needs trust infrastructure.</h3>
185
+ <p>Start with security. Add verification. Build trust.</p>
186
+ <a href="https://github.com/darfaz/clawmoat">⭐ Star on GitHub</a>
187
+ </div>
188
+
189
+ <pre><code>npm install -g clawmoat</code></pre>
190
+
191
+ <p>Questions? Ideas? <a href="https://github.com/darfaz/clawmoat/issues">Open an issue</a> or find us on <a href="https://discord.com/invite/clawd">Discord</a>.</p>
192
+
193
+ <p style="color:var(--gray);font-size:.85rem;margin-top:48px;padding-top:24px;border-top:1px solid rgba(255,255,255,.06)">ClawMoat is open source (MIT). 142 tests. Zero dependencies. <a href="https://github.com/darfaz/clawmoat">GitHub →</a></p>
194
+ </div>
195
+ </article>
196
+ </body>
197
+ </html>
@@ -0,0 +1,223 @@
1
+ <!DOCTYPE html>
2
+ <html lang="en">
3
+ <head>
4
+ <meta charset="UTF-8">
5
+ <meta name="viewport" content="width=device-width, initial-scale=1.0">
6
+ <title>ClawMoat vs LlamaFirewall vs NeMo Guardrails — Which AI Agent Security Tool? | ClawMoat Blog</title>
7
+ <meta name="description" content="Detailed comparison of ClawMoat, Meta's LlamaFirewall, and NVIDIA's NeMo Guardrails. Which open-source AI agent security tool should you use?">
8
+ <meta property="og:title" content="ClawMoat vs LlamaFirewall vs NeMo Guardrails">
9
+ <meta property="og:description" content="Three open-source tools, three different approaches to AI agent security. Here's how to choose.">
10
+ <link rel="canonical" href="https://clawmoat.com/blog/clawmoat-vs-llamafirewall-nemo-guardrails">
11
+ <style>
12
+ *{margin:0;padding:0;box-sizing:border-box}
13
+ body{font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif;background:#0F172A;color:#F8FAFC;line-height:1.8}
14
+ a{color:#3B82F6}
15
+ .container{max-width:760px;margin:0 auto;padding:40px 24px}
16
+ nav{background:rgba(15,23,42,.95);padding:16px 24px;position:fixed;top:0;left:0;right:0;z-index:100;border-bottom:1px solid rgba(59,130,246,.15)}
17
+ nav a{color:#94A3B8;text-decoration:none;margin-right:24px;font-size:.9rem}
18
+ nav a:first-child{color:#F8FAFC;font-weight:700;font-size:1.1rem}
19
+ article{padding-top:80px}
20
+ h1{font-size:2.2rem;font-weight:800;line-height:1.2;margin-bottom:16px;letter-spacing:-.02em}
21
+ h2{font-size:1.5rem;font-weight:700;margin:48px 0 16px;color:#10B981}
22
+ h3{font-size:1.2rem;margin:32px 0 12px}
23
+ p{margin-bottom:16px;color:#CBD5E1}
24
+ .meta{color:#64748B;font-size:.9rem;margin-bottom:40px}
25
+ table{width:100%;border-collapse:collapse;margin:24px 0;font-size:.9rem}
26
+ th{text-align:left;padding:12px;border-bottom:2px solid #334155;color:#94A3B8;font-weight:600}
27
+ td{padding:10px 12px;border-bottom:1px solid rgba(255,255,255,.06)}
28
+ .yes{color:#10B981}
29
+ .no{color:#EF4444}
30
+ code{background:#1E293B;padding:2px 8px;border-radius:4px;font-size:.85rem}
31
+ pre{background:#0a0e17;border:1px solid #334155;border-radius:10px;padding:20px;overflow-x:auto;margin:20px 0;font-size:.85rem;line-height:1.6}
32
+ blockquote{border-left:3px solid #3B82F6;padding:12px 20px;margin:20px 0;background:#1E293B;border-radius:0 8px 8px 0;font-style:italic}
33
+ .cta{background:#1E293B;border:1px solid rgba(59,130,246,.3);border-radius:14px;padding:32px;text-align:center;margin:48px 0}
34
+ .cta h3{color:#F8FAFC;margin:0 0 12px}
35
+ .cta code{font-size:1rem;background:#0a0e17;padding:8px 16px}
36
+ .btn{display:inline-block;padding:12px 28px;background:#3B82F6;color:#fff;border-radius:8px;text-decoration:none;font-weight:600;margin:8px}
37
+ .btn:hover{background:#2563EB}
38
+ </style>
39
+ </head>
40
+ <body>
41
+ <nav>
42
+ <a href="/">🏰 ClawMoat</a>
43
+ <a href="/blog/">Blog</a>
44
+ <a href="https://github.com/darfaz/clawmoat">GitHub</a>
45
+ <a href="/#pricing">Pricing</a>
46
+ </nav>
47
+ <div class="container">
48
+ <article>
49
+ <h1>ClawMoat vs LlamaFirewall vs NeMo Guardrails: Which Open-Source AI Agent Security Tool?</h1>
50
+ <div class="meta">February 25, 2026 · 8 min read · By Dar Fazulyanov</div>
51
+
52
+ <p>Three open-source projects. Three very different approaches to securing AI agents. If you're running AI agents in production (or on your laptop), you need to understand what each one actually does — because they solve fundamentally different problems.</p>
53
+
54
+ <h2>The Quick Answer</h2>
55
+
56
+ <table>
57
+ <thead>
58
+ <tr><th></th><th>ClawMoat</th><th>LlamaFirewall</th><th>NeMo Guardrails</th></tr>
59
+ </thead>
60
+ <tbody>
61
+ <tr><td><strong>Maker</strong></td><td>Open source</td><td>Meta</td><td>NVIDIA</td></tr>
62
+ <tr><td><strong>Language</strong></td><td>Node.js</td><td>Python</td><td>Python</td></tr>
63
+ <tr><td><strong>Focus</strong></td><td>Host protection</td><td>Prompt/agent safety</td><td>Conversational guardrails</td></tr>
64
+ <tr><td><strong>Dependencies</strong></td><td>Zero</td><td>PyTorch, transformers</td><td>Multiple</td></tr>
65
+ <tr><td><strong>Protects</strong></td><td>Your machine</td><td>Your model</td><td>Your conversations</td></tr>
66
+ <tr><td><strong>Credential monitoring</strong></td><td class="yes">✅</td><td class="no">❌</td><td class="no">❌</td></tr>
67
+ <tr><td><strong>Permission tiers</strong></td><td class="yes">✅</td><td class="no">❌</td><td class="no">❌</td></tr>
68
+ <tr><td><strong>Skill/plugin auditing</strong></td><td class="yes">✅</td><td class="no">❌</td><td class="no">❌</td></tr>
69
+ <tr><td><strong>Prompt injection</strong></td><td class="yes">✅</td><td class="yes">✅</td><td class="yes">✅</td></tr>
70
+ <tr><td><strong>Setup time</strong></td><td>30 seconds</td><td>~30 minutes</td><td>~15 minutes</td></tr>
71
+ <tr><td><strong>License</strong></td><td>MIT</td><td>MIT</td><td>Apache 2.0</td></tr>
72
+ </tbody>
73
+ </table>
74
+
75
+ <h2>LlamaFirewall (Meta)</h2>
76
+
77
+ <p>Released May 2025, LlamaFirewall is Meta's open-source guardrail framework. It's serious engineering — used in production at Meta itself. Three main components:</p>
78
+
79
+ <ul style="margin:16px 0;padding-left:24px;color:#CBD5E1">
80
+ <li><strong>PromptGuard 2</strong> — A fine-tuned classifier that detects prompt injection and jailbreak attempts with high accuracy</li>
81
+ <li><strong>AlignmentCheck</strong> — Uses an LLM judge to verify agent actions align with their intended goals</li>
82
+ <li><strong>CodeShield</strong> — Scans generated code for security vulnerabilities before execution</li>
83
+ </ul>
84
+
85
+ <p><strong>Strengths:</strong> State-of-the-art prompt injection detection. Meta's research backing. Production-proven at massive scale. The PromptGuard 2 model is genuinely impressive.</p>
86
+
87
+ <p><strong>Weaknesses:</strong> Python-only. Requires PyTorch and ML model downloads (heavy). Focused on the model/prompt layer — doesn't know or care about your filesystem, credentials, or installed plugins.</p>
88
+
89
+ <p><strong>Best for:</strong> Teams building LLM applications who need the best possible prompt injection and jailbreak detection.</p>
90
+
91
+ <h2>NeMo Guardrails (NVIDIA)</h2>
92
+
93
+ <p>NVIDIA's framework for adding programmable guardrails to LLM-based conversational systems. Think of it as a policy layer for chatbots and assistants.</p>
94
+
95
+ <ul style="margin:16px 0;padding-left:24px;color:#CBD5E1">
96
+ <li>Topical guardrails (keep conversations on-track)</li>
97
+ <li>Safety guardrails (content moderation)</li>
98
+ <li>Hallucination detection and fact-checking</li>
99
+ <li>Custom flows using Colang (their domain-specific language)</li>
100
+ </ul>
101
+
102
+ <p><strong>Strengths:</strong> Extremely flexible. Colang lets you define complex conversational policies. Great integration with the NVIDIA AI ecosystem.</p>
103
+
104
+ <p><strong>Weaknesses:</strong> Designed for conversational AI, not autonomous agents. Steep learning curve (Colang is its own language). Heavy dependency chain.</p>
105
+
106
+ <p><strong>Best for:</strong> Teams building customer-facing chatbots and copilots who need content safety and conversation control.</p>
107
+
108
+ <h2>ClawMoat</h2>
109
+
110
+ <p>ClawMoat protects a fundamentally different layer: <strong>the host machine itself</strong>. If you're running AI agents on your laptop, a dedicated machine, or in the cloud, ClawMoat is the security layer between the agent and your operating system.</p>
111
+
112
+ <ul style="margin:16px 0;padding-left:24px;color:#CBD5E1">
113
+ <li><strong>Host Guardian</strong> — 4 permission tiers (observer → full), enforced at runtime</li>
114
+ <li><strong>Forbidden zones</strong> — Auto-protects SSH keys, AWS creds, crypto wallets, browser data</li>
115
+ <li><strong>Credential monitoring</strong> — Watches sensitive directories for unauthorized access</li>
116
+ <li><strong>Skill integrity checking</strong> — Hash-based verification + suspicious pattern detection for installed plugins</li>
117
+ <li><strong>Network egress logging</strong> — See exactly where your agent sends data</li>
118
+ <li><strong>Plus:</strong> Prompt injection scanning, policy engine, audit trails</li>
119
+ </ul>
120
+
121
+ <p><strong>Strengths:</strong> Only tool protecting the host layer. Zero dependencies. Sub-millisecond scanning. Installs in seconds. Node.js native (where most AI agent frameworks run).</p>
122
+
123
+ <p><strong>Weaknesses:</strong> Prompt injection detection is pattern-based + heuristic, not ML-based (lighter but less sophisticated than PromptGuard 2). No conversational guardrails.</p>
124
+
125
+ <p><strong>Best for:</strong> Anyone running AI agents that have shell access, file system access, or credential access — especially on personal machines or shared infrastructure.</p>
126
+
127
+ <h2>The Real Insight: These Solve Different Problems</h2>
128
+
129
+ <p>The industry is (correctly) obsessed with prompt injection. But there's a gap nobody's talking about:</p>
130
+
131
+ <blockquote>
132
+ <p>Your agent can read ~/.ssh/id_rsa right now. No prompt injection required — it already has permission.</p>
133
+ </blockquote>
134
+
135
+ <p>LlamaFirewall asks: "Is this prompt trying to hijack the agent?"<br>
136
+ NeMo Guardrails asks: "Is this conversation staying on topic?"<br>
137
+ ClawMoat asks: "Should this agent be allowed to access this file / run this command / talk to this server?"</p>
138
+
139
+ <p>They're complementary. The best security posture uses multiple layers:</p>
140
+
141
+ <ol style="margin:16px 0;padding-left:24px;color:#CBD5E1">
142
+ <li><strong>Prompt layer:</strong> LlamaFirewall or similar to catch injection attempts</li>
143
+ <li><strong>Conversation layer:</strong> NeMo Guardrails for content safety (if applicable)</li>
144
+ <li><strong>Host layer:</strong> ClawMoat to enforce what the agent can actually DO</li>
145
+ </ol>
146
+
147
+ <h2>Decision Matrix</h2>
148
+
149
+ <table>
150
+ <thead>
151
+ <tr><th>If you need...</th><th>Use</th></tr>
152
+ </thead>
153
+ <tbody>
154
+ <tr><td>Best-in-class prompt injection detection</td><td>LlamaFirewall</td></tr>
155
+ <tr><td>Conversational safety for chatbots</td><td>NeMo Guardrails</td></tr>
156
+ <tr><td>Protect your machine from your own agent</td><td>ClawMoat</td></tr>
157
+ <tr><td>Runtime permission control for agents</td><td>ClawMoat</td></tr>
158
+ <tr><td>Credential and filesystem monitoring</td><td>ClawMoat</td></tr>
159
+ <tr><td>Supply chain security for agent plugins</td><td>ClawMoat</td></tr>
160
+ <tr><td>Comprehensive defense-in-depth</td><td>All three</td></tr>
161
+ </tbody>
162
+ </table>
163
+
164
+ <h2>Update: The Ecosystem Just Got Bigger (Feb 26)</h2>
165
+
166
+ <p>Since we first published this comparison, three new players have entered the OpenClaw security space:</p>
167
+
168
+ <h3>Runlayer — Enterprise SaaS</h3>
169
+ <p><a href="https://venturebeat.com/orchestration/runlayer-is-now-offering-secure-openclaw-agentic-capabilities-for-large">Covered by VentureBeat</a>. NYC startup offering "OpenClaw for Enterprise" with ToolGuard (real-time blocking, &lt;100ms latency) and OpenClaw Watch (shadow AI discovery via MDM). Claims 8.7% → 95% prompt injection resistance. Integrates with Okta and Entra. <strong>Closed source, enterprise pricing.</strong></p>
170
+
171
+ <h3>Crittora — Cryptographic Policy Enforcement</h3>
172
+ <p>Announced via <a href="https://finance.yahoo.com/news/crittora-makes-openclaw-enterprise-ready-155800602.html">Yahoo Finance PR</a>. Cryptographically enforced policy framework for OpenClaw. Targets enterprise compliance. <strong>Different approach — policy signatures, not host protection.</strong></p>
173
+
174
+ <h3>KiloClaw (Kilo.ai) — Managed Hosting</h3>
175
+ <p><a href="https://venturebeat.com/orchestration/kilo-launches-kiloclaw-allowing-anyone-to-deploy-hosted-openclaw-agents-into">Covered by VentureBeat</a>. Backed by GitLab co-founder. Deploy OpenClaw on managed VMs (Fly.io) in 60 seconds. Handles the "3am crash" problem with always-on monitoring. <strong>Hosting solution, not a security tool — complementary to ClawMoat.</strong></p>
176
+
177
+ <h3>Updated Comparison</h3>
178
+ <table>
179
+ <thead>
180
+ <tr><th>Tool</th><th>Layer</th><th>Open Source?</th><th>Host Protection?</th><th>Target</th></tr>
181
+ </thead>
182
+ <tbody>
183
+ <tr><td><strong>ClawMoat</strong></td><td>Host / OS</td><td>✅ MIT</td><td>✅</td><td>Everyone (free core)</td></tr>
184
+ <tr><td>LlamaFirewall</td><td>Model / Prompt</td><td>✅ MIT</td><td>❌</td><td>ML teams</td></tr>
185
+ <tr><td>NeMo Guardrails</td><td>Conversation</td><td>✅ Apache 2</td><td>❌</td><td>Chatbot builders</td></tr>
186
+ <tr><td>Runlayer</td><td>Enterprise Governance</td><td>❌ Proprietary</td><td>Partial</td><td>Large enterprises</td></tr>
187
+ <tr><td>Crittora</td><td>Policy / Crypto</td><td>❌ Proprietary</td><td>❌</td><td>Compliance teams</td></tr>
188
+ <tr><td>KiloClaw</td><td>Managed Hosting</td><td>❌ Proprietary</td><td>❌ (VM isolation)</td><td>Developers / SMBs</td></tr>
189
+ </tbody>
190
+ </table>
191
+
192
+ <p><strong>Key insight:</strong> <a href="https://www.microsoft.com/en-us/security/blog/2026/02/19/running-openclaw-safely-identity-isolation-runtime-risk/">Microsoft's security team says</a> OpenClaw is "not appropriate for standard workstations." Runlayer and KiloClaw solve this by moving agents off your machine. ClawMoat solves it by securing agents <em>on</em> your machine. Different philosophies — and for anyone who wants to keep running agents locally, ClawMoat is the only open-source option.</p>
193
+
194
+ <h2>Getting Started</h2>
195
+
196
+ <pre><code># ClawMoat — 30 seconds to host protection
197
+ npm install -g clawmoat
198
+ clawmoat scan ~/.openclaw/
199
+ clawmoat skill-audit ~/.openclaw/skills/
200
+ clawmoat report
201
+
202
+ # LlamaFirewall — model-layer security
203
+ pip install llamafirewall
204
+ # Requires model downloads (~2GB)
205
+
206
+ # NeMo Guardrails — conversational safety
207
+ pip install nemoguardrails
208
+ # Requires configuration files + Colang</code></pre>
209
+
210
+ <div class="cta">
211
+ <h3>Try ClawMoat</h3>
212
+ <p style="color:#94A3B8;margin-bottom:16px">Zero dependencies. MIT licensed. 142 tests passing.</p>
213
+ <code>npm install -g clawmoat</code>
214
+ <br><br>
215
+ <a href="https://github.com/darfaz/clawmoat" class="btn">⭐ Star on GitHub</a>
216
+ <a href="https://clawmoat.com/#pricing" class="btn" style="background:#10B981">See Plans</a>
217
+ </div>
218
+
219
+ <p style="font-size:.85rem;color:#64748B;margin-top:40px">This comparison was written in February 2026. All three projects are actively developed — check their repos for the latest features.</p>
220
+ </article>
221
+ </div>
222
+ </body>
223
+ </html>