Skip to main content

Deterministic in-path execution boundary for OpenClaw agents

Project description

ClawZero

PyPI CI License

ClawZero Header

Same input. Same agent. Different execution boundary.

ClawZero is a deterministic execution boundary for OpenClaw agents.
It places policy enforcement between model output and tool execution.
Powered by MVAR, the runtime for secure AI agents.

ClawZero is not a model. It is a runtime enforcement boundary.
It works with any LLM, any OpenClaw agent, and any tool definition.

Install from PyPIDocumentation

Quick StartWhy ClawZeroAttack DemoWitness Artifact

Standard OpenClaw executes the attack. ClawZero blocks it deterministically.

ClawZero places a deterministic execution boundary between model output and tool execution.

ClawZero vs Standard OpenClaw

30-Second Quickstart

pip install clawzero
clawzero demo openclaw --mode compare --scenario shell

Expected output:

STANDARD OPENCLAW  →  COMPROMISED
MVAR-PROTECTED     →  BLOCKED ✓
Witness generated  →  YES

LangChain Integration

from clawzero.adapters.langchain import protect_langchain_tool

safe_tool = protect_langchain_tool(
    my_langchain_tool,
    sink="filesystem.read",
    profile="prod_locked",
)

Run the packaged example:

python examples/langchain_integration.py

Why ClawZero?

Autonomous AI agents frequently execute tool calls with high privileges.

When these agents ingest untrusted input, prompt injection can escalate into:

  • shell execution
  • filesystem access
  • credential leakage
  • data exfiltration

ClawZero prevents these escalations by enforcing deterministic policy checks at execution sinks before commands run.

Threat Model

OpenClaw agents commonly run with tools capable of:

  • shell execution
  • filesystem access
  • credential retrieval
  • outbound network requests

When these agents process untrusted documents or user input, hidden instructions can influence tool calls.

Without an execution boundary, these instructions can trigger high-privilege operations.

ClawZero intercepts these tool calls and enforces policy before execution occurs.

Attack Demo Proof

The attack demo exists to demonstrate runtime enforcement behavior.

ClawZero is not a model safety claim.

It is an execution boundary claim.

The demo illustrates how untrusted input can influence agent tool calls and how the ClawZero boundary blocks those actions deterministically.

Run the side-by-side comparison:

clawzero demo openclaw --mode compare --scenario shell
clawzero demo openclaw --mode compare --scenario credentials
clawzero demo openclaw --mode compare --scenario benign

Security and Responsible Use

ClawZero is a defensive security component designed to enforce execution boundaries for AI agents.

The project includes attack demonstrations and adversarial scenarios to show how prompt injection and untrusted inputs can reach high-privilege execution sinks.

These demonstrations exist solely for defensive research and education.

When using ClawZero or its demonstrations:

  • Only test systems you own or have explicit authorization to evaluate
  • Run demonstrations in sandboxed or isolated environments
  • Treat automated results as signals; verify findings manually

ClawZero is designed to prevent exploitation, not enable it.

The attack demonstrations show how enforcement works; they are not tools for performing real-world attacks.

Canonical Witness Artifact

{
  "timestamp": "2026-03-12T10:00:00Z",
  "agent_runtime": "openclaw",
  "sink_type": "shell.exec",
  "target": "bash",
  "decision": "block",
  "reason_code": "UNTRUSTED_TO_CRITICAL_SINK",
  "policy_id": "mvar-security.v1.4.3",
  "engine": "mvar-security",
  "provenance": {
    "source": "external_document",
    "taint_level": "untrusted",
    "source_chain": ["external_document", "openclaw_tool_call"],
    "taint_markers": ["prompt_injection", "external_content"]
  },
  "adapter": {
    "name": "openclaw",
    "mode": "event_intercept",
    "framework": "openclaw"
  },
  "witness_signature": "ed25519:d91fd8f73f3d05f8ec7b3d8e5e7cf2e27869a5f0f1ee3bd17da2df5ec41c9cb2a3c7e4f3540b4f7f4f948f0f185318273447bcb0adf24a4b2a1b53b7a1b2c90a"
}

What ClawZero Is / Is Not

ClawZero is:

  • an in-path runtime enforcement substrate
  • deterministic sink policy evaluation
  • a signed witness artifact generator

ClawZero is not:

  • a red-team toolkit
  • an attack simulation platform
  • an LLM-as-judge safety layer

CLI

Command families map to enforcement jobs:

  • clawzero demo - run side-by-side enforcement proof demos
  • clawzero witness - inspect and validate witness artifacts
  • clawzero audit - evaluate deterministic decisions for sink requests
  • clawzero attack - replay known attack scenarios as enforcement proofs
  • clawzero report - export witness artifacts to SARIF for code scanning

Zero-Config API

from clawzero import protect

safe_tool = protect(
    my_tool,
    sink="filesystem.read",
    profile="prod_locked"
)

Policy Profiles

Sink Type dev_balanced dev_strict prod_locked
shell.exec block block block
filesystem.read allow, block /etc/**, ~/.ssh/** block, allow /workspace/** block, allow /workspace/project/**
filesystem.write allow, block /etc/**, ~/.ssh/** block, allow /workspace/** block, allow /workspace/project/**
credentials.access block block block
http.request allow allow mode + block all domains allow mode + allow localhost
tool.custom allow annotate allow

Powered by MVAR

MVAR is the enforcement engine. ClawZero is the OpenClaw adapter. MVAR governs the sink policy enforcement decisions.

  • MVAR repository: https://github.com/mvar-security/mvar
  • Filed as provisional patent (February 24, 2026, 24 claims)
  • Submitted to NIST RFI Docket NIST-2025-0035
  • Published as preprint on SSRN (February 2026)

License

Apache 2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

clawzero-0.1.2.tar.gz (47.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

clawzero-0.1.2-py3-none-any.whl (47.4 kB view details)

Uploaded Python 3

File details

Details for the file clawzero-0.1.2.tar.gz.

File metadata

  • Download URL: clawzero-0.1.2.tar.gz
  • Upload date:
  • Size: 47.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for clawzero-0.1.2.tar.gz
Algorithm Hash digest
SHA256 296c32d8d6993f2621a36660c9cf84e14843a4b8fe24f71d5029f76e4789b856
MD5 914d688de45cb5017c56562eb9854b6a
BLAKE2b-256 d6e4db50406ed2a0c7d6c186e7ac9312deddb03f89b8d1c69fd466babbe0154a

See more details on using hashes here.

File details

Details for the file clawzero-0.1.2-py3-none-any.whl.

File metadata

  • Download URL: clawzero-0.1.2-py3-none-any.whl
  • Upload date:
  • Size: 47.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for clawzero-0.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 cce5ebcd6e3727a7cb23a4a461bc2ac00aba9914e73b185092c966e642a8dcf7
MD5 764731ed3ae5a5da84e513ad08d31efb
BLAKE2b-256 eea60bdcdf1d1d6fcfc73eb9cdd79af9acaa087a939933e60e3fd34cc3fc8934

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page