christinminor459/OnionClaw
Provide AI agents with full Tor network access and dark web data through a zero-config OpenClaw skill or standalone tool.
[](https://github.com/JacobJandon/OnionClaw/blob/main/LICENSE) [](https://github.com/JacobJandon/OnionClaw/actions/workflows/ci.yml) [](https://github.com/JacobJandon/OnionClaw)
by JacobJandon
<p align="center"> </p>
> OpenClaw skill + standalone tool β full Tor / dark web access for AI agents
OnionClaw gives AI agents full access to the Tor network and .onion hidden services. It runs as an OpenClaw skill (drop-in, zero config beyond a .env file) and also works standalone from any terminal.
Based on the SICRY engine β 18 dark web search engines, Robin OSINT pipeline, four LLM analysis modes.
# As an OpenClaw skill:
cp -r OnionClaw ~/.openclaw/skills/onionclaw
# β agent now has 7 dark web commands available in every session
# Standalone:
python3 check_tor.py # verify Tor
python3 search.py --query "ransomware healthcare"
python3 pipeline.py --query "acme.com data leak" --mode corporate---
> *Autonomous agents paired with the Tor network will be one of the most dangerous automation stacks on the internet within the next five years. OnionClaw is living proof that the rabbit hole goes deeper than most people think.*
This tool is built for legitimate OSINT, threat intelligence, and security research. But the same primitives β anonymous routing, bulk scraping, AI-driven synthesis, zero-attribution browsing, automated identity rotation β are precisely what make this combination genuinely dangerous in the wrong hands.
This is not a warning tucked in fine print. It is the whole point of writing it down openly.
Loading reviews...