PiQrypt cryptographic audit trail bridge for OpenClaw autonomous agents
Project description
piqrypt-openclaw-integration
Verifiable AI Agent Memory_Cryptographic audit trail for OpenClaw autonomous agents.
Every reasoning step, tool execution (bash, Python, file ops), and task result — signed, hash-chained, tamper-proof.
pip install piqrypt-openclaw
The problem
OpenClaw has OS-level access — it can run bash, write files, execute Python. When an autonomous agent has this much power, you need to know exactly what it did and when. PiQrypt makes every action cryptographically irrefutable.
Quickstart
from openclaw import Agent
from piqrypt_openclaw import AuditableOpenClaw
# Wrap your existing OpenClaw agent
base_agent = Agent(config)
agent = AuditableOpenClaw(base_agent, identity_file="openclaw.json")
# Execute tasks — every step is stamped automatically
result = agent.execute_task(task)
# Export tamper-proof audit trail
agent.export_audit("openclaw-audit.json")
# $ piqrypt verify openclaw-audit.json
Granular tool stamping
# Stamp each tool call individually for full traceability
agent = AuditableOpenClaw(base_agent, identity_file="openclaw.json")
# After planning
prev = agent.stamp_reasoning(task.description, plan, model="llama-3.2")
# After each tool call
prev = agent.stamp_tool_call("bash", "ls -la /reports", output, prev)
prev = agent.stamp_tool_call("python", analysis_code, result, prev)
prev = agent.stamp_tool_call("file_write", "report.pdf", "written", prev)
Security monitoring
# Detect suspicious bash patterns (rm -rf, curl | bash, etc.)
suspicious = agent.get_suspicious_events()
for event in suspicious:
print(f"⚠️ Suspicious action stamped:")
print(f" Tool: {event['payload']['tool']}")
print(f" Hash: {event['payload']['input_hash'][:16]}...")
print(f" Timestamp: {event['timestamp']}")
Suspicious patterns are stamped and flagged, not blocked — the audit trail proves what happened.
Decorator pattern
from piqrypt_openclaw import stamp_action
@stamp_action("file_analysis", identity_file="my-agent.json")
def analyze_sales_data(path: str) -> dict:
return your_analysis_logic(path)
@stamp_action("report_generation", identity_file="my-agent.json")
def generate_report(data: dict) -> str:
return your_report_logic(data)
What gets stamped
| Event | When |
|---|---|
agent_initialized |
Agent creation |
task_start |
Before task execution |
task_reasoning |
After LLM planning phase |
tool_execution |
Each tool call (bash, Python, file ops) |
task_complete |
After task finishes |
task_failed |
On exception (with error hash) |
All events are Ed25519-signed, SHA-256 hash-chained.
Raw commands and outputs are never stored — only their SHA-256 hashes.
Verify
piqrypt verify openclaw-audit.json
# ✅ Chain integrity verified — 24 events, 0 forks
piqrypt search --type tool_execution --limit 10
# Lists last 10 tool calls with timestamps
Full integration guide
→ docs/OPENCLAW_INTEGRATION.md
Links
- PiQrypt core: github.com/piqrypt/piqrypt
- Issues: github.com/piqrypt/piqrypt/issues
- Support: piqrypt@gmail.com
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file piqrypt_openclaw_integration-1.0.0.tar.gz.
File metadata
- Download URL: piqrypt_openclaw_integration-1.0.0.tar.gz
- Upload date:
- Size: 3.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0592e7f6e8473c9a3c3f077fecb58f6737e439fb54401e72dea5f518a012d9cd
|
|
| MD5 |
585b0cce659bb4b5b300701fc6a1f202
|
|
| BLAKE2b-256 |
126654ff784d0c2d3954035037a714d08022aba7a088bbfb0aebb54e85a6d015
|
Provenance
The following attestation bundles were made for piqrypt_openclaw_integration-1.0.0.tar.gz:
Publisher:
publish.yml on PiQrypt/piqrypt-openclaw-integration
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
piqrypt_openclaw_integration-1.0.0.tar.gz -
Subject digest:
0592e7f6e8473c9a3c3f077fecb58f6737e439fb54401e72dea5f518a012d9cd - Sigstore transparency entry: 991681178
- Sigstore integration time:
-
Permalink:
PiQrypt/piqrypt-openclaw-integration@0a3cd5aa22f0a2119e2f34b302041933b8e834e9 -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/PiQrypt
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@0a3cd5aa22f0a2119e2f34b302041933b8e834e9 -
Trigger Event:
release
-
Statement type:
File details
Details for the file piqrypt_openclaw_integration-1.0.0-py3-none-any.whl.
File metadata
- Download URL: piqrypt_openclaw_integration-1.0.0-py3-none-any.whl
- Upload date:
- Size: 3.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
255b6b577d5d78f5576e549cb3ded62493379460ba6aae186ca5a5c9abbb5898
|
|
| MD5 |
f715e5a29d05f723173b57034da8ec52
|
|
| BLAKE2b-256 |
fc982a16ca6878cde95b33969fcf824e75a8e602cac122560eb0e0dd735a1bd4
|
Provenance
The following attestation bundles were made for piqrypt_openclaw_integration-1.0.0-py3-none-any.whl:
Publisher:
publish.yml on PiQrypt/piqrypt-openclaw-integration
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
piqrypt_openclaw_integration-1.0.0-py3-none-any.whl -
Subject digest:
255b6b577d5d78f5576e549cb3ded62493379460ba6aae186ca5a5c9abbb5898 - Sigstore transparency entry: 991681181
- Sigstore integration time:
-
Permalink:
PiQrypt/piqrypt-openclaw-integration@0a3cd5aa22f0a2119e2f34b302041933b8e834e9 -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/PiQrypt
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@0a3cd5aa22f0a2119e2f34b302041933b8e834e9 -
Trigger Event:
release
-
Statement type: