Skip to content

wraithvector0/wraithvector-openclaw

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

44 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

WraithVector — Control what your AI agent is allowed to do

Intercepts every OpenClaw tool call before execution. Applies policy. Blocks dangerous actions. Generates audit evidence.

"WraithVector is the governance layer sitting on top of OpenClaw,
enforcing what I can and can't do."

an OpenClaw agent, describing its own governance layer

License: MIT

⚠️ Beta — actively developed. APIs may change.
Issues and feedback welcome → https://github.com/wraithvector0/wraithvector-openclaw/issues


Your AI agent is executing real commands on your machine.

Do you know which ones?

OpenClaw agents run shell commands, read files, fetch URLs — autonomously,
including overnight via cron jobs, while you sleep.

Security researchers recently reported that 26% of OpenClaw skills contain critical vulnerabilities.

WraithVector intercepts every tool call before execution.
Every decision generates cryptographic audit evidence for EU AI Act and DORA compliance.

Works with any OpenClaw agent. No code changes required.

Unlike guardrails that analyse prompts, WraithVector enforces policy at the tool execution layer.


Install (1 command)

curl -fsSL https://raw.githubusercontent.com/wraithvector0/wraithvector-openclaw/main/install.sh | bash

Set your API key:

export WRAITHVECTOR_API_KEY=wv_your_key_here
openclaw gateway restart

Get your free API key → 30 seconds. No credit card.


Verify plugin loaded

After installation, confirm that OpenClaw detected the plugin:

openclaw plugins inspect wraithvector

Expected output:

WraithVector Governance id: wraithvector

Status: loaded Format: openclaw Source: ~/.openclaw/workspace/plugins/wraithvector/index.mjs Shape: hook-only

Typed hooks: before_tool_call

If Status: loaded appears, the governance layer is active.

Open the dashboard

Once your API key is set and OpenClaw is running, you can view all tool decisions in the WraithVector dashboard.

Open:

https://app.wraithvector.com/openclaw

The dashboard shows:

  • Last 5 tool calls intercepted by WraithVector
  • allow / block decisions
  • command or path evaluated
  • risk level and reason
  • minimal audit record

Every agent action evaluated by WraithVector appears here in real time.

After installing the plugin, trigger a few agent actions and refresh the dashboard.

Start in observe mode (zero risk)

Don't want to block anything yet? Start by watching.

export WRAITHVECTOR_MODE=observe
openclaw gateway restart

In observe mode, every tool call is logged and evaluated.
The dashboard shows what would have been blocked — with full audit evidence.
Switch to enforce mode when you're ready.

⚠️ WOULD BLOCK  exec  curl https://evil.com   COMMAND_NOT_ALLOWED
⚠️ WOULD BLOCK  read  ~/.ssh/id_rsa            PATH_NOT_ALLOWED
✅ ALLOW        exec  ls
✅ ALLOW        read  ~/.openclaw/workspace/SOUL.md

View shareable audit report →


Update

To update the plugin to the latest version:

curl -fsSL https://raw.githubusercontent.com/wraithvector0/wraithvector-openclaw/main/install.sh | bash
openclaw gateway restart

Security notice

Observe mode does not block execution.

This mode is intended for:

  • initial deployment
  • policy tuning
  • developer experimentation

Dangerous commands may still execute if the policy is not set to enforce.

For production environments use: enforce

What it catches

Threat Example Status
Dangerous shell commands rm -rf /, curl | bash 🔴 Blocked
File access outside workspace ~/.ssh/id_rsa, ~/.env 🔴 Blocked
Compromised ClawHub skills Data exfiltration attempts 🔴 Blocked
Unauthorized external requests POSTing data to unknown URLs 🔴 Blocked
Prompt injection tool abuse Skill executing unintended commands 🔴 Blocked
Cron/subagent autonomous actions Agent running overnight, unsupervised 👁️ Monitored


Scope

WraithVector governs pre-execution tool calls.

It prevents agents or skills from executing unauthorized commands, accessing restricted files, or calling external resources outside policy.

Out of scope:

  • Prompt injection at the LLM reasoning layer
  • Infrastructure misconfiguration (exposed gateways, leaked API keys)
  • Multi-agent spawning correlation (planned)

WraithVector acts as the last line of defense between an AI agent and your machine.

Tradeoffs

  • cloud policy evaluation adds latency
  • fail-closed means uptime matters
  • external evaluation may not fit all privacy requirements
  • local/self-hosted mode is planned

Real scenario

In February 2026, an OpenClaw agent autonomously created a dating profile
without explicit user consent. WraithVector would have:

  • Blocked the action before execution
  • Generated cryptographic forensic evidence
  • Alerted the operator via Slack/email in real time

This is not hypothetical. Agents run autonomously. Without governance,
you have no visibility and no control.


Quick test

After installing, ask your agent:

run the command: rm -rf /

In enforce mode, you should see:

WraithVector → BLOCK
Reason: COMMAND_NOT_ALLOWED
Audit: https://app.wraithvector.com/audit/...

The agent itself will tell you why it was blocked.


Hook coverage

Hook What it controls
before_tool_call Intercepts exec, read, web_fetch before execution
after_tool_call (coming soon) Result filtering and capture
Tool Coverage
exec Command allowlist — only permitted commands execute
read Path scope — only allowed paths accessible
write (coming soon)
web_fetch (coming soon) Domain allowlist/blocklist

Audit trail

Every decision generates:

  • Decision record — tool, command, decision, reason, timestamp
  • Cryptographic hash chain — tamper-evident, independently verifiable
  • Shareable audit URL — send to your CTO or compliance team, no login required
  • PDF evidence pack — EU AI Act Article 12, DORA ready (Pro)
  • Real-time alerts — Slack/email on high-risk events (Pro)

Default policy

{
  "exec": {
    "allowed_commands": ["ls", "pwd", "echo", "cat", "grep"]
  },
  "read": {
    "allowed_paths": ["~/.openclaw/workspace/"]
  }
}

Manage policies in the dashboard — no plugin changes required.
Any tool not explicitly permitted is blocked by default. Allowlist, not blocklist.


Architecture

OpenClaw agent tool call
        ↓
 before_tool_call hook
        ↓
 WraithVector API (policy evaluation)
        ↓
   ALLOW / BLOCK
        ↓
+ cryptographic audit record
+ shareable audit URL
+ PDF evidence pack (Pro)
+ real-time alert (Pro)
        ↓
 OpenClaw executes or stops

Fail-closed by default — if WraithVector is unreachable, actions are blocked.
Set WRAITHVECTOR_FAIL_OPEN=true for development only.


Security model

WraithVector enforces governance outside the agent runtime.

  • Enforcement cannot be bypassed by the agent
  • Decisions are externally auditable
  • Policies update without touching agent code

Manual install

mkdir -p ~/.openclaw/workspace/plugins/wraithvector
curl -o ~/.openclaw/workspace/plugins/wraithvector/index.mjs \
  https://raw.githubusercontent.com/wraithvector0/wraithvector-openclaw/main/index.mjs
curl -o ~/.openclaw/workspace/plugins/wraithvector/openclaw.plugin.json \
  https://raw.githubusercontent.com/wraithvector0/wraithvector-openclaw/main/openclaw.plugin.json
openclaw gateway restart

Roadmap

  • exec tool policy enforcement
  • read tool policy enforcement
  • Observe mode (see everything, block nothing)
  • Cryptographic audit trail (hash chain)
  • Shareable audit URL
  • PDF evidence pack
  • Real-time Slack/email alerts
  • after_tool_call result governance
  • write tool policy
  • web_fetch domain restrictions
  • Human-in-the-loop via /approve
  • Multi-agent session governance

Contributing

Open issues:

  • after_tool_call result filtering
  • write tool policy
  • web_fetch domain allowlist/blocklist
  • Human-in-the-loop via OpenClaw /approve hooks

License

MIT


WraithVector — AI Agent Governance for regulated environments.
EU AI Act · DORA · GDPR

Questions: fran@wraithvector.com





About

Runtime governance plugin for OpenClaw agents — policy enforcement, command scope control, and cryptographic audit trail. Powered by WraithVector.

Topics

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors