Skip to content
Cisco AI Defense logo
CiscoAI Security

RPC status — DefenseClaw

Overview

The scoped gateway sources do not register a public WebSocket or JSON-RPC route on the sidecar or guardrail proxy mux. The API surface available to external clients is HTTP: the sidecar routes in internal/gateway/api.go and the proxy routes in internal/gateway/proxy.go.

Available request-response surfaces

NeedUse this HTTP surfaceNotes
Runtime statusGET /status on 18970Sidecar status handler
Policy reloadPOST /policy/reload on 18970Requires sidecar mutating-request headers
Scanner submission/v1/skill/scan, /v1/plugin/scan, /v1/mcp/scan on 18970Sidecar scanner handlers
Guardrail runtime modeGET or PATCH /v1/guardrail/config on 18970Only mode and scanner_mode are patchable
Network egress recordsGET or POST /api/v1/network-egress on 18970Structured audit-backed egress records
LLM traffic proxying/v1/chat/completions, /chat/completions, or provider-native passthrough on 4000Guardrail proxy auth and provider headers apply

Client implications

Use ordinary HTTP clients for automation. For repeated reads, poll the relevant route or consume the persisted artifacts described in Observability. For LLM response streaming, use the guardrail proxy streaming behavior described in Events and streaming.

curl -s http://127.0.0.1:18970/status | jq .

curl -s -X POST http://127.0.0.1:18970/policy/reload \
  -H "X-DefenseClaw-Client: docs" \
  -H "Content-Type: application/json" \
  -d '{}' | jq .

Related