ClawVault OpenClaw Skill Guide
Complete guide for installing, configuring, and using the ClawVault skill in OpenClaw.
Overview
The ClawVault skill enables AI-guided installation, configuration, and management of the ClawVault security system directly from OpenClaw. It provides a complete suite of tools for protecting AI agents from prompt injection, data leakage, and dangerous commands.
Key Features:
- AI-guided installation - Multi-mode setup with intelligent defaults
- Rule generation - Create security rules from natural language
- Scenario templates - Pre-configured policies for common use cases
- Health monitoring - Real-time service status and diagnostics
- Detection testing - Built-in test suites for validation
- Lifecycle management - Complete install/configure/uninstall workflow
Installation Methods
Method 1: Install as OpenClaw Skill (Recommended)
Copy the skill to your OpenClaw skills directory:
Option 1: Install from ClawHub (Recommended)
# Install the dedicated installer from ClawHub
openclaw skills install tophant-clawvault-installer --version=0.2.9 --force
# Or use clawhub CLI
clawhub install tophant-clawvault-installer --version 0.2.9
ClawHub: https://clawhub.ai/Martin2877/tophant-clawvault-installer
Option 2: Install from Local Repository
# Copy skill directory
cp -r skills/tophant-clawvault-installer ~/.openclaw/skills/
# Or create symbolic link (recommended for development)
ln -s /path/to/ClawVault/skills/tophant-clawvault-installer ~/.openclaw/skills/tophant-clawvault-installer
Restart OpenClaw to load the skill:
openclaw restart
Verify the skill is loaded:
openclaw skills list
# Should show: tophant-clawvault-installer
Method 2: Use as Built-in Skill
If ClawVault is already installed, the skill is automatically available:
from claw_vault.skills.registry import SkillRegistry
registry = SkillRegistry()
registry.register_builtins()
# The clawvault skill is now available
result = registry.invoke("clawvault_installer", "check_health")
Method 3: Standalone Script
Download and use the standalone script without OpenClaw:
# Download script
curl -O https://raw.githubusercontent.com/tophant-ai/ClawVault/main/skills/tophant-clawvault-installer/clawvault_manager.py
# Use directly
python clawvault_manager.py install --mode quick
python clawvault_manager.py health
Command Reference
/clawvault install
Install ClawVault with AI-guided setup.
Usage:
/clawvault install --mode quick
/clawvault install --mode standard
/clawvault install --mode advanced
Installation Modes:
-
quick - One-click install with recommended defaults
- Installs from PyPI (fallback to GitHub)
- Creates default configuration
- Enables all detection features
- Sets interactive guard mode
-
standard - Interactive configuration
- Prompts for common settings
- Allows port customization
- Choose guard mode
- Select detection features
-
advanced - Full customization
- Complete control over all settings
- Custom detection patterns
- Advanced proxy configuration
- Budget and monitoring settings
What Happens During Installation:
- Checks prerequisites (Python 3.10+, pip)
- Installs ClawVault package
- Creates configuration directory (
~/.ClawVault/) - Generates default config.yaml
- Runs health check
- Reports installation status
/clawvault start
Start ClawVault proxy and dashboard services.
Usage:
# Start with default settings (localhost only)
clawvault start
# Start with dashboard accessible from any IP
clawvault start --dashboard-host 0.0.0.0
# Start with custom ports
clawvault start --port 8765 --dashboard-port 8766
# Start with specific guard mode
clawvault start --mode strict
# Start without dashboard
clawvault start --no-dashboard
# Combine options
clawvault start --dashboard-host 0.0.0.0 --dashboard-port 8080 --mode interactive
Command-line Options:
--port <PORT>- Proxy listen port (default: 8765)--dashboard-port <PORT>- Dashboard web UI port (default: 8766)--dashboard-host <HOST>- Dashboard bind address:127.0.0.1(default) - Local access only (secure)0.0.0.0- Allow remote access from any IP- Specific IP - Bind to specific network interface
--mode <MODE>- Guard mode:permissive,interactive, orstrict--no-dashboard- Disable web dashboard--config <PATH>- Path to custom config.yaml
Dashboard Access:
- Local only:
http://127.0.0.1:8766(default, secure) - Remote access:
http://0.0.0.0:8766orhttp://<server-ip>:8766
Security Notes:
- Use
0.0.0.0only in trusted networks or behind firewall - Dashboard shows sensitive detection data
- For production, use reverse proxy with HTTPS
/clawvault health
Check ClawVault service health and configuration status.
Usage:
/clawvault health
Returns:
- Installation status (installed/not installed)
- Version information
- Service running status (proxy, dashboard)
- Configuration validity
- Port availability (8765, 8766)
- Overall health status
/clawvault generate-rule
Generate security rules from natural language or apply pre-configured scenarios.
Usage:
/clawvault generate-rule "Block all AWS credentials and API keys"
/clawvault generate-rule --scenario customer_service --apply
/clawvault generate-rule --scenario development
Available Scenarios:
customer_service- PII detection + auto-sanitization for customer supportdevelopment- API key protection + dangerous command detectionproduction- Strict mode with high-risk content blockingfinance- Financial compliance + comprehensive PII detection
Options:
--apply- Automatically apply the generated rule to ClawVault--scenario <name>- Use a pre-configured security scenario
Natural Language Examples:
# Detect specific threats
/clawvault generate-rule "Detect and block all database passwords"
# Multi-condition rules
/clawvault generate-rule "Block AWS credentials with risk score above 8.0"
# Compliance-focused
/clawvault generate-rule "Detect all PII for GDPR compliance"
/clawvault status
Get current ClawVault running status and statistics.
Usage:
/clawvault status
Returns:
- Service uptime
- Detection statistics (total requests, blocked, sanitized)
- Active rules count
- Dashboard URL
- Token usage and cost
/clawvault test
Run built-in detection tests to verify ClawVault capabilities.
Usage:
/clawvault test --category all
/clawvault test --category sensitive
/clawvault test --category injection
/clawvault test --category commands
Test Categories:
all- Run all detection testssensitive- Test PII and credential detectioninjection- Test prompt injection detectioncommands- Test dangerous command detection
Test Coverage:
- Sensitive data: API keys, credit cards, emails, phone numbers
- Injection attacks: Prompt injection, role hijacking, jailbreak attempts
- Dangerous commands: rm -rf, curl|bash, system exploits
/clawvault uninstall
Remove ClawVault from the system.
Usage:
/clawvault uninstall
/clawvault uninstall --keep-config
Options:
--keep-config- Preserve configuration files for future reinstallation
What Gets Removed:
- ClawVault Python package
- Service files (if using systemd)
- Optionally: Configuration directory (
~/.ClawVault/)
Configuration
Configuration File
Create ~/.ClawVault/config.yaml for persistent settings:
# Proxy Configuration
proxy:
host: "127.0.0.1"
port: 8765
# Dashboard Configuration
dashboard:
enabled: true
host: "0.0.0.0" # Allow remote access
port: 8766
# Guard Mode
guard:
mode: "interactive" # permissive | interactive | strict
# Detection Settings
detection:
check_sensitive: true
check_injection: true
check_commands: true
# Audit Settings
audit:
enabled: true
store_path: "~/.ClawVault/audit.db"
Load custom config:
clawvault start --config /path/to/config.yaml
Environment Variables
# OpenAI API Key (for rule generation)
export OPENAI_API_KEY="sk-..."
# Custom config path
export CLAWVAULT_CONFIG="~/.ClawVault/config.yaml"
# Log level
export CLAWVAULT_LOG_LEVEL="DEBUG" # DEBUG | INFO | WARNING | ERROR
Guard Modes
Permissive Mode:
- Logs all detections
- Never blocks requests
- Good for testing and development
Interactive Mode (Recommended):
- Asks user before blocking
- Shows detection details
- Allows override decisions
- Good for production with human oversight
Strict Mode:
- Automatically blocks high-risk content
- No user interaction
- Good for automated systems
Security Scenario Templates
Customer Service Scenario
Use Case: Protect customer PII in support conversations
Features:
- Detect phone numbers, ID cards, emails, addresses
- Auto-sanitize sensitive data (replace with
[REDACTED]) - Block prompt injection attacks
- Interactive mode (ask before blocking)
Apply:
/clawvault generate-rule --scenario customer_service --apply
Generated Policy:
For customer service agents, detect and auto-sanitize all PII data
including phone numbers, ID cards, emails, addresses. Block prompt
injections. Use interactive mode.
Development Scenario
Use Case: Protect secrets in development environment
Features:
- Detect API keys, tokens, passwords, private keys
- Detect dangerous shell commands
- Auto-sanitize secrets
- Permissive mode (log only, don't block)
Apply:
/clawvault generate-rule --scenario development --apply
Generated Policy:
For development environment, detect API keys, tokens, passwords,
and dangerous commands. Auto-sanitize secrets. Allow everything else.
Production Scenario
Use Case: Strict security for production systems
Features:
- Block all high-risk content (score >= 7.0)
- Detect all threat types
- Strict mode (block immediately)
- No auto-sanitization (preserve evidence)
Apply:
/clawvault generate-rule --scenario production --apply
Generated Policy:
For production environment, block all threats with risk score above 7.0.
Strict mode. No auto-sanitization.
Finance Scenario
Use Case: Financial compliance and data protection
Features:
- Detect credit cards, bank accounts, SSN, routing numbers
- Detect all PII types
- Block high-risk content
- Strict compliance mode
Apply:
/clawvault generate-rule --scenario finance --apply
Generated Policy:
For financial applications, detect credit cards, bank accounts, SSN,
and all PII. Block high-risk content. Strict compliance mode.
Advanced Configuration
Dashboard Remote Access
For Development/Testing:
# Allow access from any IP on default port
clawvault start --dashboard-host 0.0.0.0
# Custom port for remote access
clawvault start --dashboard-host 0.0.0.0 --dashboard-port 8080
# Access from browser
http://<server-ip>:8766
Firewall Configuration:
# Allow port 8766
sudo ufw allow 8766
# Or for specific IP range
sudo ufw allow from 192.168.1.0/24 to any port 8766
Verify Listening:
netstat -tlnp | grep 8766
# Should show: 0.0.0.0:8766
Docker Deployment
Dockerfile:
FROM python:3.10-slim
RUN pip install clawvault
EXPOSE 8765 8766
CMD ["clawvault", "start", "--dashboard-host", "0.0.0.0"]
Build and Run:
# Build image
docker build -t clawvault .
# Run container
docker run -p 8765:8765 -p 8766:8766 clawvault
# Access dashboard
http://localhost:8766
Systemd Service (Linux)
Create /etc/systemd/system/clawvault.service:
[Unit]
Description=ClawVault AI Security Service
After=network.target
[Service]
Type=simple
User=clawvault
WorkingDirectory=/opt/clawvault
Environment="OPENAI_API_KEY=sk-..."
ExecStart=/usr/local/bin/clawvault start --dashboard-host 0.0.0.0
Restart=always
RestartSec=10
[Install]
WantedBy=multi-user.target
Enable and start:
sudo systemctl enable clawvault
sudo systemctl start clawvault
sudo systemctl status clawvault
Troubleshooting
Installation Issues
Problem: Installation fails with network error
Solution:
- Check internet connection
- Try GitHub install:
pip install git+https://github.com/tophant-ai/ClawVault.git - Use standalone script with
--mode quick
Problem: Python version too old
Solution:
# Check Python version
python3 --version
# Should be 3.10 or higher
# Install Python 3.10+ or use virtual environment
python3.10 -m venv venv
source venv/bin/activate
Service Issues
Problem: Services not running after installation
Solution:
# Start ClawVault manually
clawvault start
# Check status
clawvault status
# View logs
tail -f ~/.ClawVault/logs/clawvault.log
Problem: Port already in use
Solution:
# Find process using port
lsof -i :8765
lsof -i :8766
# Kill process
kill -9 <PID>
# Or use different ports
clawvault start --port 8767 --dashboard-port 8768
Dashboard Issues
Problem: Cannot access dashboard remotely
Solutions:
-
Check bind address:
clawvault start --dashboard-host 0.0.0.0 -
Check firewall:
sudo ufw allow 8766 -
Verify listening:
netstat -tlnp | grep 8766 # Should show: 0.0.0.0:8766
Rule Generation Issues
Problem: Rule generation returns error
Solution:
- Ensure ClawVault is running:
clawvault status - Check
OPENAI_API_KEYis set:echo $OPENAI_API_KEY - Verify dashboard is accessible:
http://localhost:8766 - Check API quota and billing
Problem: Generated rules don't work as expected
Solution:
- Review generated YAML in dashboard
- Test with specific examples
- Adjust risk thresholds
- Use more specific natural language descriptions
Detection Issues
Problem: Tests failing unexpectedly
Solution:
- Check detection configuration in config.yaml
- Verify patterns are enabled
- Review detection logs:
~/.ClawVault/logs/detection.log - Run specific category tests to isolate issue
Problem: False positives/negatives
Solution:
- Adjust risk score thresholds
- Customize detection patterns
- Use guard mode appropriate for your use case
- Review and update rules regularly
Integration with OpenClaw
Automatic Proxy Configuration
The skill automatically configures OpenClaw to use ClawVault proxy:
- Sets environment variables (
HTTP_PROXY,HTTPS_PROXY) - Configures systemd service (if available)
- Verifies integration success
Manual Proxy Setup
If automatic configuration doesn't work:
# Set proxy environment variables
export HTTP_PROXY=http://127.0.0.1:8765
export HTTPS_PROXY=http://127.0.0.1:8765
# For OpenClaw systemd service
sudo systemctl edit openclaw-gateway
# Add:
[Service]
Environment="HTTP_PROXY=http://127.0.0.1:8765"
Environment="HTTPS_PROXY=http://127.0.0.1:8765"
# Restart OpenClaw
sudo systemctl restart openclaw-gateway
Verification
Check that traffic is flowing through ClawVault:
- Start ClawVault:
clawvault start - Open dashboard:
http://localhost:8766 - Make an AI request in OpenClaw
- Verify request appears in dashboard
Best Practices
1. Start with Quick Mode
For first-time users, use quick mode to get started:
/clawvault install --mode quick
2. Test Before Production
Always run tests before deploying to production:
/clawvault test --category all
3. Use Scenario Templates
Leverage pre-defined scenarios for common use cases:
/clawvault generate-rule --scenario customer_service --apply
4. Monitor Health Regularly
Check health status periodically:
/clawvault health
5. Keep Configuration
When uninstalling, keep configuration for easy reinstall:
/clawvault uninstall --keep-config
6. Review Detection Logs
Regularly review logs to tune detection:
tail -f ~/.ClawVault/logs/detection.log
7. Update Rules
Keep security rules up-to-date:
# Regenerate rules with latest patterns
/clawvault generate-rule --scenario production --apply
CLI Reference
Help Commands
# Show main help
clawvault --help
clawvault -h
# Show version
clawvault --version
clawvault -v
# Show command-specific help
clawvault start --help
clawvault install --help
Common Commands
# Start services
clawvault start
clawvault start --dashboard-host 0.0.0.0 --mode strict
# Check status
clawvault status
# View logs
clawvault logs
clawvault logs --follow
# Stop services
clawvault stop
# Restart services
clawvault restart
Support
- Documentation: https://github.com/tophant-ai/ClawVault/tree/main/doc
- Issues: https://github.com/tophant-ai/ClawVault/issues
- Repository: https://github.com/tophant-ai/ClawVault
License
MIT © 2026 Tophant SPAI Lab