Intercepts every OpenClaw tool call before execution. Applies policy. Blocks dangerous actions. Generates audit evidence.
"WraithVector is the governance layer sitting on top of OpenClaw,
enforcing what I can and can't do."
an OpenClaw agent, describing its own governance layer
⚠️ Beta — actively developed. APIs may change.
Issues and feedback welcome → https://github.com/wraithvector0/wraithvector-openclaw/issues
OpenClaw agents run shell commands, read files, fetch URLs — autonomously,
including overnight via cron jobs, while you sleep.
Security researchers recently reported that 26% of OpenClaw skills contain critical vulnerabilities.
WraithVector intercepts every tool call before execution.
Every decision generates cryptographic audit evidence for EU AI Act and DORA compliance.
Works with any OpenClaw agent. No code changes required.
Unlike guardrails that analyse prompts, WraithVector enforces policy at the tool execution layer.
curl -fsSL https://raw.githubusercontent.com/wraithvector0/wraithvector-openclaw/main/install.sh | bashSet your API key:
export WRAITHVECTOR_API_KEY=wv_your_key_here
openclaw gateway restartGet your free API key → 30 seconds. No credit card.
After installation, confirm that OpenClaw detected the plugin:
openclaw plugins inspect wraithvector
Expected output:
WraithVector Governance id: wraithvector
Status: loaded Format: openclaw Source: ~/.openclaw/workspace/plugins/wraithvector/index.mjs Shape: hook-only
Typed hooks: before_tool_call
If Status: loaded appears, the governance layer is active.
Once your API key is set and OpenClaw is running, you can view all tool decisions in the WraithVector dashboard.
Open:
https://app.wraithvector.com/openclaw
The dashboard shows:
- Last 5 tool calls intercepted by WraithVector
- allow / block decisions
- command or path evaluated
- risk level and reason
- minimal audit record
Every agent action evaluated by WraithVector appears here in real time.
After installing the plugin, trigger a few agent actions and refresh the dashboard.
Don't want to block anything yet? Start by watching.
export WRAITHVECTOR_MODE=observe
openclaw gateway restartIn observe mode, every tool call is logged and evaluated.
The dashboard shows what would have been blocked — with full audit evidence.
Switch to enforce mode when you're ready.
⚠️ WOULD BLOCK exec curl https://evil.com COMMAND_NOT_ALLOWED
⚠️ WOULD BLOCK read ~/.ssh/id_rsa PATH_NOT_ALLOWED
✅ ALLOW exec ls
✅ ALLOW read ~/.openclaw/workspace/SOUL.md
To update the plugin to the latest version:
curl -fsSL https://raw.githubusercontent.com/wraithvector0/wraithvector-openclaw/main/install.sh | bash
openclaw gateway restart
Observe mode does not block execution.
This mode is intended for:
- initial deployment
- policy tuning
- developer experimentation
Dangerous commands may still execute if the policy is not set to enforce.
For production environments use: enforce
| Threat | Example | Status |
|---|---|---|
| Dangerous shell commands | rm -rf /, curl | bash |
🔴 Blocked |
| File access outside workspace | ~/.ssh/id_rsa, ~/.env |
🔴 Blocked |
| Compromised ClawHub skills | Data exfiltration attempts | 🔴 Blocked |
| Unauthorized external requests | POSTing data to unknown URLs | 🔴 Blocked |
| Prompt injection tool abuse | Skill executing unintended commands | 🔴 Blocked |
| Cron/subagent autonomous actions | Agent running overnight, unsupervised | 👁️ Monitored |
WraithVector governs pre-execution tool calls.
It prevents agents or skills from executing unauthorized commands, accessing restricted files, or calling external resources outside policy.
Out of scope:
- Prompt injection at the LLM reasoning layer
- Infrastructure misconfiguration (exposed gateways, leaked API keys)
- Multi-agent spawning correlation (planned)
WraithVector acts as the last line of defense between an AI agent and your machine.
- cloud policy evaluation adds latency
- fail-closed means uptime matters
- external evaluation may not fit all privacy requirements
- local/self-hosted mode is planned
In February 2026, an OpenClaw agent autonomously created a dating profile
without explicit user consent. WraithVector would have:
- Blocked the action before execution
- Generated cryptographic forensic evidence
- Alerted the operator via Slack/email in real time
This is not hypothetical. Agents run autonomously. Without governance,
you have no visibility and no control.
After installing, ask your agent:
run the command: rm -rf /
In enforce mode, you should see:
WraithVector → BLOCK
Reason: COMMAND_NOT_ALLOWED
Audit: https://app.wraithvector.com/audit/...
The agent itself will tell you why it was blocked.
| Hook | What it controls |
|---|---|
before_tool_call |
Intercepts exec, read, web_fetch before execution |
after_tool_call |
(coming soon) Result filtering and capture |
| Tool | Coverage |
|---|---|
exec |
Command allowlist — only permitted commands execute |
read |
Path scope — only allowed paths accessible |
write |
(coming soon) |
web_fetch |
(coming soon) Domain allowlist/blocklist |
Every decision generates:
- Decision record — tool, command, decision, reason, timestamp
- Cryptographic hash chain — tamper-evident, independently verifiable
- Shareable audit URL — send to your CTO or compliance team, no login required
- PDF evidence pack — EU AI Act Article 12, DORA ready (Pro)
- Real-time alerts — Slack/email on high-risk events (Pro)
{
"exec": {
"allowed_commands": ["ls", "pwd", "echo", "cat", "grep"]
},
"read": {
"allowed_paths": ["~/.openclaw/workspace/"]
}
}Manage policies in the dashboard — no plugin changes required.
Any tool not explicitly permitted is blocked by default. Allowlist, not blocklist.
OpenClaw agent tool call
↓
before_tool_call hook
↓
WraithVector API (policy evaluation)
↓
ALLOW / BLOCK
↓
+ cryptographic audit record
+ shareable audit URL
+ PDF evidence pack (Pro)
+ real-time alert (Pro)
↓
OpenClaw executes or stops
Fail-closed by default — if WraithVector is unreachable, actions are blocked.
Set WRAITHVECTOR_FAIL_OPEN=true for development only.
WraithVector enforces governance outside the agent runtime.
- Enforcement cannot be bypassed by the agent
- Decisions are externally auditable
- Policies update without touching agent code
mkdir -p ~/.openclaw/workspace/plugins/wraithvector
curl -o ~/.openclaw/workspace/plugins/wraithvector/index.mjs \
https://raw.githubusercontent.com/wraithvector0/wraithvector-openclaw/main/index.mjs
curl -o ~/.openclaw/workspace/plugins/wraithvector/openclaw.plugin.json \
https://raw.githubusercontent.com/wraithvector0/wraithvector-openclaw/main/openclaw.plugin.json
openclaw gateway restart- exec tool policy enforcement
- read tool policy enforcement
- Observe mode (see everything, block nothing)
- Cryptographic audit trail (hash chain)
- Shareable audit URL
- PDF evidence pack
- Real-time Slack/email alerts
- after_tool_call result governance
- write tool policy
- web_fetch domain restrictions
- Human-in-the-loop via /approve
- Multi-agent session governance
Open issues:
after_tool_callresult filteringwritetool policyweb_fetchdomain allowlist/blocklist- Human-in-the-loop via OpenClaw
/approvehooks
MIT
WraithVector — AI Agent Governance for regulated environments.
EU AI Act · DORA · GDPR
Questions: fran@wraithvector.com
