oktsec/oktsec-openclaw
oktsec plugin for OpenClaw. Runtime security for AI agent tool calls. 188 detection rules, tamper-evident audit trail.
Platform-specific configuration:
{
"mcpServers": {
"oktsec-openclaw": {
"command": "npx",
"args": [
"-y",
"oktsec-openclaw"
]
}
}
}Add the config above to .claude/settings.json under the mcpServers key.
[](https://www.npmjs.com/package/@oktsec/openclaw) [](LICENSE) [](https://github.com/oktsec/oktsec)
Runtime security plugin for OpenClaw. Intercepts agent tool calls and messages, scans through 188 detection rules, and blocks threats before execution.
openclaw plugins install @oktsec/openclawoktsec gateway must be running:
brew install oktsec/tap/oktsec
oktsec runopenclaw plugins install @oktsec/openclawoktsec runopenclaw gateway| Event | Hook | Direction | |-------|------|-----------| | Incoming messages | message_received | User -> Agent | | Outgoing messages | message_sending / message_sent | Agent -> User | | Tool calls (before) | before_tool_call | Agent -> Tool | | Tool results (after) | after_tool_call | Tool -> Agent |
Every intercepted event is scanned through oktsec's security pipeline:
In enforce mode, threats are blocked before they execute. In observe mode, everything is logged without blocking.
The plugin works out of the box with default settings. To customize, edit your OpenClaw config:
{
"plugins": {
"entries": {
"oktsec": {
"enabled": true,
"config": {
"gatewayUrl": "http://1Loading reviews...