Observe
See what your agent does. Block nothing.
Findings stream to the audit DB and your sinks. Run it for a week before enforcement.
DefenseClaw inspects every prompt, completion, and tool call your AI coding agent makes — block, approve, or audit, per connector.
Stories
Switch action mode on, prove a destructive shell command never reaches the disk.
Read →
Regex packs flag the obvious; the LLM judge catches the clever ones.
Read →
Cursor’s beforeShellExecution hook is the stop point. We scan, then ask before it runs.
Read →
HITL sits between observe and enforcement. Pause, review, then continue.
Read →
One command brings up Prometheus, Loki, Tempo, and Grafana — pre-wired to the gateway.
Read →
The audit DB is connector-agnostic. Setup rewires the data path; nothing else moves.
Read →
Three modes, one command
Start in observe. Promote to action when the policy is tuned. Layer approval prompts on top for CRITICAL findings.
See what your agent does. Block nothing.
Findings stream to the audit DB and your sinks. Run it for a week before enforcement.
Block on HIGH and CRITICAL.
CRITICAL findings always block. HIGH findings block unless approval mode pauses them for review.
Pause, review, then continue.
Reaches the operator via the connector’s native ask, or downgrades to a TUI prompt.
Connectors
Every connector lands in the same gateway with the same block / approve / observe verbs — pick the agent you ship with, the contract is identical.
Enforcement gated behind guardrail.claudecode_enforcement_enabled.
Open page →
CodexThree telemetry channels at boot: hooks, native OTel, and the notify bridge for agent-turn-complete events.
Open page →
OpenClawReference proxy connector — full data-path interception, sandbox enforcement, plugin-mediated HITL.
Open page →
Cursorhooks.json under ~/.cursor; MCP / skills / rules surfaces are workspace-scoped.
Open page →
HermesHooks live in ~/.hermes/config.yaml.
Open page →
Gemini CLIsettings.json hooks; native OTLP exporter wires directly to the gateway.
Open page →
GitHub Copilot CLIWorkspace-scoped hooks under <workspace>/.github/hooks/.
Open page →
WindsurfCascade hooks under ~/.codeium/windsurf/hooks.json.
Open page →
ZeptoClawapi_base redirect into the DefenseClaw proxy plus response-scan.
Open page →
Five minutes. No LLM key required.