Click on a layer to see the details

01

Control Hierarchy

Three distinct authority levels. Each level has explicit and non-extensible permissions.

02

Intelligent Permission Classifier

NEW

Before each action, the risk level is automatically evaluated based on type, scope, reversibility and history.

03

Locked Configuration

Security parameters are protected by an immutable system flag. The agent cannot modify its own rules.

04

PIN Code for Sensitive Actions

Any high-impact action requires human PIN validation.

05

Blocking PreToolUse Hooks

NEW

Declarative interception and blocking of dangerous actions before execution. Over 15 events cover the complete lifecycle.

06

External Content Isolation

External content is treated as pure data, never as executable instructions.

07

3-Layer Email Pipeline

Reading via fixed script, analysis in sandbox, processing on allowlist only.

08

One-Shot Messaging Architecture

Each message creates an isolated session that terminates after processing.

09

Independent Monitoring

The monitoring system alerts the operator directly without going through the agent.

10

Loopback-Only Network Gateway

The gateway only responds to local connections. No external access possible.

11

Secure Boot Order

Security configuration is loaded before any other module.

12

Messaging Pairing

Every new contact must be manually approved before interaction.

13

Contact Allowlist

Only listed contacts trigger actions. Any other source is ignored.

14

Runtime Shell Command Enforcement

An independent daemon intercepts every shell command and applies 3-tier policies: automatic deny, automatic allow, or real-time human approval.

15

Memory Shepherd

Protects agent memory with baseline/scratch separation and automated archival every 3 hours.

16

Guardian Watchdog

Self-healing service watchdog with escalated recovery, file integrity checks, and generational backups.

17

Adversarial Verification Agent

NEW

An independent agent verifies results from others by applying an adversarial process: logical flaws, sources, coherence.

Full transparency on what happened and how we responded.

01

PIN leaked via messaging

Cause

The security PIN was exposed in a message processed by a sub-agent. The old code was compromised through reasoning visible in session logs.

Resolution

PIN changed immediately. Client messaging architecture redesigned: dedicated monitoring daemon, isolated one-shot sub-agents. PIN no longer transits through messaging sessions.

02

Corrupted default agent

Cause

A secondary agent became the default agent instead of the main agent. For 3 days, all commands were routed to an agent without the right permissions.

Resolution

Default agent restored. Added a healthcheck that verifies default agent configuration at startup. Consistency alerts added.

03

Internal reasoning leak

Cause

The agent's internal reasoning (chain of thought) was included in a response, exposing implementation details.

Resolution

Output filter added to strip reasoning blocks before sending. Response format validation made mandatory.

NEW

The three new EasyClaw v2 security layers are now directly integrated into the defense stack above (layers 02, 05 and 17). They cover three distinct moments in an action's lifecycle:

Transparency on current limitations.

  • Does not make autonomous financial decisions
  • Does not contact persons not on the allowlist
  • Does not modify its own security rules
  • Does not retain sensitive data between sessions
  • Does not self-replicate or deploy new agents without approval
Security | OpenClaw × Easylab