Python SDK for clawdstrike security verification
Project description
clawdstrike
Python SDK for Clawdstrike security verification.
Installation
pip install clawdstrike
Quick Start
from clawdstrike import Clawdstrike
cs = Clawdstrike.with_defaults("strict")
# Check file access
decision = cs.check_file("/etc/shadow")
if decision.denied:
print(f"Blocked: {decision.message}")
# Check network egress
decision = cs.check_network("api.openai.com")
print(f"Allowed: {decision.allowed}")
Usage
Facade API (recommended)
from clawdstrike import Clawdstrike, Decision, DecisionStatus
# Built-in rulesets: "permissive", "default", "strict", "ai-agent", "cicd"
cs = Clawdstrike.with_defaults("strict")
# All check methods return a Decision
decision = cs.check_file("/etc/passwd")
decision = cs.check_command("rm -rf /")
decision = cs.check_network("evil.com", 443)
decision = cs.check_patch("/app/main.py", diff_str)
decision = cs.check_mcp_tool("shell_exec", {"cmd": "ls"})
# Decision properties
print(decision.status) # DecisionStatus.DENY
print(decision.denied) # True
print(decision.allowed) # False
print(decision.message) # "Access to forbidden path: ..."
print(decision.guard) # "forbidden_path"
print(decision.per_guard) # List of individual GuardResult objects
Sessions
cs = Clawdstrike.with_defaults("default")
session = cs.session(agent_id="my-agent")
session.check_file("/app/src/main.py")
session.check_network("api.openai.com")
session.check_file("/home/user/.ssh/id_rsa")
summary = session.get_summary()
print(f"Checks: {summary.check_count}")
print(f"Allowed: {summary.allow_count}")
print(f"Denied: {summary.deny_count}")
print(f"Blocked: {summary.blocked_actions}")
Loading from YAML
from clawdstrike import Clawdstrike
# From file
cs = Clawdstrike.from_policy("policy.yaml")
# From YAML string
cs = Clawdstrike.from_policy('''
version: "1.1.0"
name: my-policy
extends: strict
guards:
egress_allowlist:
allow:
- "api.myservice.com"
''')
Low-level API
from clawdstrike import Policy, PolicyEngine, FileAccessAction, GuardContext
policy = Policy.from_yaml_file("policy.yaml")
engine = PolicyEngine(policy)
context = GuardContext(cwd="/app")
results = engine.check(FileAccessAction(path="/app/src/main.py"), context)
print(all(r.allowed for r in results))
Native Engine (Recommended)
The SDK automatically uses the bundled native engine when available. All 12 guards run in Rust with full detection capabilities.
On unsupported platforms, the SDK falls back to pure Python with 9 guards and heuristic-only detection.
Native wheels are published for:
- Linux:
manylinux(x86_64,aarch64) - macOS:
x86_64,arm64 - Windows:
x86_64
from clawdstrike import Clawdstrike, NATIVE_AVAILABLE, init_native
# Check if native engine is available
print(f"Native available: {NATIVE_AVAILABLE}")
print(f"Native engine: {init_native()}")
# The facade auto-selects the best backend
cs = Clawdstrike.with_defaults("strict")
print(f"Backend: {cs._backend.name}") # "native" or "pure_python"
Explicit Backend Selection
from clawdstrike import Clawdstrike
from clawdstrike.backend import DaemonEngineBackend, NativeEngineBackend, PurePythonBackend
from clawdstrike.policy import Policy, PolicyEngine
# Force pure Python backend
yaml = 'version: "1.1.0"\nname: test\nextends: strict\n'
policy = Policy.from_yaml_with_extends(yaml)
cs = Clawdstrike(PurePythonBackend(PolicyEngine(policy)))
# Force native backend (raises if unavailable)
backend = NativeEngineBackend.from_ruleset("strict")
cs = Clawdstrike(backend)
# Force daemon-backed evaluation through hushd
daemon = DaemonEngineBackend("https://hushd.example.com", api_key="dev-token")
cs = Clawdstrike(daemon)
Origin-Aware Checks
Origin-aware enforcement is available on:
- the bundled native Rust backend
- hushd via
Clawdstrike.from_daemon(...)orDaemonEngineBackend
The pure-Python backend does not enforce policy.origins. It fails closed with
UnsupportedOriginFeatureError if you pass origin or use origin.output_send.
from clawdstrike import Clawdstrike
origin = {
"provider": "slack",
"tenant_id": "T123",
"space_id": "C456",
"actor_role": "incident_commander",
}
cs = Clawdstrike.from_daemon("https://hushd.example.com", api_key="dev-token")
decision = cs.check_mcp_tool(
"read_file",
{"path": "/srv/runbook.md"},
origin=origin,
)
send_decision = cs.check_output_send(
"Posting sanitized status update",
target="slack://incident-room",
mime_type="text/plain",
metadata={"thread_id": "1712502451.000100"},
origin=origin,
)
Per-check origin changes also work through sessions:
session = cs.session(session_id="sess-123", agent_id="triage-bot")
session.check_file(
"/srv/runbook.md",
origin={"provider": "github", "space_id": "repo-1"},
)
session.check_output_send(
"Ready for review",
target="slack://incident-room",
origin={"provider": "slack", "space_id": "C456"},
)
Features
- Native Rust engine (bundled in
clawdstrikewheels on supported platforms) with all 12 guards - Pure Python fallback with 9 guards:
- ForbiddenPathGuard - Blocks sensitive filesystem paths
- PathAllowlistGuard - Allowlist-based path access control
- EgressAllowlistGuard - Controls network egress by domain
- SecretLeakGuard - Detects secrets in file writes
- PatchIntegrityGuard - Validates patch safety
- ShellCommandGuard - Blocks dangerous shell commands
- McpToolGuard - Restricts MCP tool invocations
- PromptInjectionGuard - Detects prompt injection
- JailbreakGuard - Detects jailbreak attempts
- Facade API with
Clawdstrikeclass andDecisionreturn type - Stateful sessions with
ClawdstrikeSession - Custom exception hierarchy (
ClawdstrikeErrorbase) - Policy engine with YAML configuration and inheritance
- Receipt signing and verification with Ed25519
- Typed action variants (frozen dataclasses)
License
Apache-2.0
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distributions
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file clawdstrike-0.2.7.tar.gz.
File metadata
- Download URL: clawdstrike-0.2.7.tar.gz
- Upload date:
- Size: 234.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
8b91ee63726e6e821811b28138454db87fca810203d568b6036e0febec5ef85d
|
|
| MD5 |
a43edb1c0d754d7f03c9380277e9cbbd
|
|
| BLAKE2b-256 |
39317c3623a7eabe4fd127b12e3c8b4a1cc8f67e9013afe518b468eb6f081543
|
File details
Details for the file clawdstrike-0.2.7-py3-none-any.whl.
File metadata
- Download URL: clawdstrike-0.2.7-py3-none-any.whl
- Upload date:
- Size: 143.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
5291d2e23dc9ada25a82ceebe69e17b9db85f6f5f31f4f6ee5042710e90441dc
|
|
| MD5 |
9c692bb721f666d0b6aafbc051a5dd6c
|
|
| BLAKE2b-256 |
e6ed200e40b5b3d408902fae1a2becb0ef952114636c729fa4d312e653e87040
|
File details
Details for the file clawdstrike-0.2.7-cp310-abi3-win_amd64.whl.
File metadata
- Download URL: clawdstrike-0.2.7-cp310-abi3-win_amd64.whl
- Upload date:
- Size: 4.5 MB
- Tags: CPython 3.10+, Windows x86-64
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0e88cb958137f37eb9a3ed717714dd19be7767329cd208a177d98f3e93d1dc0e
|
|
| MD5 |
202be1f355bac441e68eb7be223ca799
|
|
| BLAKE2b-256 |
d70a158c3e033711c40e08b57219a31a9e321426324390943ece4cadccad6027
|
File details
Details for the file clawdstrike-0.2.7-cp310-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.
File metadata
- Download URL: clawdstrike-0.2.7-cp310-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
- Upload date:
- Size: 4.8 MB
- Tags: CPython 3.10+, manylinux: glibc 2.17+ x86-64
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1dd2c39a2b1f1ac5fd047898c95b17e2aa6b739e7f97234a07eb09d9dc67bcf2
|
|
| MD5 |
1d4531eaa49c0c2b804f8a5f0fbb9433
|
|
| BLAKE2b-256 |
7698a1e6f74f108d033c682713c66b40027ec96c317f8d9d7b396ec420d66b4b
|
File details
Details for the file clawdstrike-0.2.7-cp310-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.
File metadata
- Download URL: clawdstrike-0.2.7-cp310-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
- Upload date:
- Size: 4.5 MB
- Tags: CPython 3.10+, manylinux: glibc 2.17+ ARM64
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
fcde30a479c852a112a0b2a7ccf51e738b736b446a465d7a218799606d115fc2
|
|
| MD5 |
64e4d123667b565b65c9b00525719af9
|
|
| BLAKE2b-256 |
7acbbaa4e698655ef79c8f7e58ed1d972aeac5282f9f62b371b6c4d0d4f1186c
|
File details
Details for the file clawdstrike-0.2.7-cp310-abi3-macosx_11_0_arm64.whl.
File metadata
- Download URL: clawdstrike-0.2.7-cp310-abi3-macosx_11_0_arm64.whl
- Upload date:
- Size: 4.4 MB
- Tags: CPython 3.10+, macOS 11.0+ ARM64
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
46b4a32495d3ccaa471957ecfa70a7c5b18a822c61db656149c7fed70d6a162f
|
|
| MD5 |
57f0964ff73ac04a56772cc27fccc306
|
|
| BLAKE2b-256 |
401fb0d96cfc2dda0116606876f18a2dc4db0263321880bda2894c74ee93c6fe
|
File details
Details for the file clawdstrike-0.2.7-cp310-abi3-macosx_10_12_x86_64.whl.
File metadata
- Download URL: clawdstrike-0.2.7-cp310-abi3-macosx_10_12_x86_64.whl
- Upload date:
- Size: 4.7 MB
- Tags: CPython 3.10+, macOS 10.12+ x86-64
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.13
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7527be5de909f14a51bb46bd7d15475123cdf30d8d7362a53ce2a4deefc19275
|
|
| MD5 |
de1839e8d1b8df6e32f98311da4e4396
|
|
| BLAKE2b-256 |
932b7c92e069619f18fed41a1ab292a0328608dec29c51ecadf96bcf6583a98b
|