Skip to content
Cisco AI Defense logo
CiscoAI Security

defenseclaw plugin — DefenseClaw

Overview

defenseclaw plugin — Manage DefenseClaw plugins — install, list, remove, scan, block, allow, disable, enable, quarantine, restore.

Reference

Synopsis

defenseclaw plugin [OPTIONS]

Subcommands

SubcommandDescription
allowAdd a plugin to the install allow list.
blockAdd a plugin to the install block list.
disableDisable a plugin at runtime via the OpenClaw gateway.
enableEnable a previously disabled plugin via the OpenClaw gateway.
infoShow detailed information about a plugin.
installInstall a plugin from a local path, npm registry, clawhub, or URL.
listList installed plugins (DefenseClaw + OpenClaw) with scan severity.
quarantineQuarantine a plugin's files to the quarantine area.
removeRemove an installed plugin.
restoreRestore a quarantined plugin to its original location.
scanScan a plugin directory for security issues.

Description

Manage DefenseClaw plugins — install, list, remove, scan, block, allow, disable, enable, quarantine, restore

defenseclaw plugin allow

Add a plugin to the install allow list

Add a plugin to the install allow list.

Allow-listed plugins skip the scan gate during install. Adding a plugin also removes it from the block list.

defenseclaw plugin allow <NAME>

Arguments

NameTypeArityRequired
nametext1yes

Options

FlagTypeDefaultEnv varRequiredDescription
--reasontextnoReason for allowing

defenseclaw plugin block

Add a plugin to the install block list

Add a plugin to the install block list.

Blocked plugins are rejected by the admission gate before any scan. Does not affect already-installed plugins — use 'plugin disable' or 'plugin quarantine' for that.

defenseclaw plugin block <NAME>

Arguments

NameTypeArityRequired
nametext1yes

Options

FlagTypeDefaultEnv varRequiredDescription
--reasontextnoReason for blocking

defenseclaw plugin disable

Disable a plugin at runtime via the OpenClaw gateway

Disable a plugin at runtime via the OpenClaw gateway.

Sends an RPC to prevent the agent from using the plugin until re-enabled. This is runtime-only — it does not block install or quarantine files.

Requires the gateway to be running.

defenseclaw plugin disable <NAME>

Arguments

NameTypeArityRequired
nametext1yes

Options

FlagTypeDefaultEnv varRequiredDescription
--reasontextnoReason for disabling

defenseclaw plugin enable

Enable a previously disabled plugin via the OpenClaw gateway

Enable a previously disabled plugin via the OpenClaw gateway.

This is a runtime-only action.

defenseclaw plugin enable <NAME>

Arguments

NameTypeArityRequired
nametext1yes

defenseclaw plugin info

Show detailed information about a plugin

Show detailed information about a plugin.

Displays plugin metadata, latest scan results from the DefenseClaw audit database, and enforcement actions.

defenseclaw plugin info <NAME>

Arguments

NameTypeArityRequired
nametext1yes

Options

FlagTypeDefaultEnv varRequiredDescription
--jsonbooleannoOutput plugin info as JSON

defenseclaw plugin install

Install a plugin from a local path, npm registry, clawhub, or URL

Install a plugin from a local path, npm registry, clawhub, or URL.

Supports four source types (auto-detected):

 Local directory defenseclaw plugin install /path/to/plugin npm package defenseclaw plugin install @openclasw/voice-call clawhub URI defenseclaw plugin install clawhub://voice-call HTTP(S) URL defenseclaw plugin install https://example.com/plugin.tgz

After downloading, the plugin is scanned for security issues. Pass --action to apply the configured plugin_actions policy (quarantine, disable, block) based on scan severity. Use --force to overwrite an existing plugin.

defenseclaw plugin install <NAME_OR_PATH>

Arguments

NameTypeArityRequired
name_or_pathtext1yes

Options

FlagTypeDefaultEnv varRequiredDescription
--forcebooleannoForce install (overwrites existing)
--actionbooleannoApply plugin_actions policy based on scan severity

defenseclaw plugin list

List installed plugins (DefenseClaw + OpenClaw) with scan severity

Options

FlagTypeDefaultEnv varRequiredDescription
--jsonbooleannoOutput as JSON

defenseclaw plugin quarantine

Quarantine a plugin's files to the quarantine area

Quarantine a plugin's files to the quarantine area.

Moves the plugin's directory to ~/.defenseclaw/quarantine/plugins/ and records the action. The plugin can be restored with 'plugin restore'.

defenseclaw plugin quarantine <NAME>

Arguments

NameTypeArityRequired
nametext1yes

Options

FlagTypeDefaultEnv varRequiredDescription
--reasontextnoReason for quarantine

defenseclaw plugin remove

Remove an installed plugin

defenseclaw plugin remove <NAME>

Arguments

NameTypeArityRequired
nametext1yes

defenseclaw plugin restore

Restore a quarantined plugin to its original location

Restore a quarantined plugin to its original location.

By default restores to the original path recorded during quarantine. Use --path to override the restore destination.

defenseclaw plugin restore <NAME>

Arguments

NameTypeArityRequired
nametext1yes

Options

FlagTypeDefaultEnv varRequiredDescription
--pathtextnoOverride restore destination (defaults to original path)

defenseclaw plugin scan

Scan a plugin directory for security issues

Scan a plugin directory for security issues.

Uses defenseclaw-plugin-scanner to check for dangerous permissions, install scripts, credential theft, obfuscation, and supply chain risks.

LLM analysis uses the same configuration as the skill scanner (reads from config.yaml: inspect_llm).

Examples:

defenseclaw plugin scan my-plugin

defenseclaw plugin scan my-plugin --policy strict

defenseclaw plugin scan my-plugin --use-llm

defenseclaw plugin scan my-plugin --use-llm --llm-model gpt-4

defenseclaw plugin scan my-plugin --policy ~/.defenseclaw/policies/custom.yaml

defenseclaw plugin scan /path/to/plugin --profile strict --lenient

defenseclaw plugin scan <NAME_OR_PATH>

Arguments

NameTypeArityRequired
name_or_pathtext1yes

Options

FlagTypeDefaultEnv varRequiredDescription
--jsonbooleannoOutput scan results as JSON
--policytextnoScan policy: default, strict, permissive, or path to YAML
--profilechoice (default, strict)noScan profile (overrides policy profile)
--use-llmbooleannoEnable LLM-based semantic analysis (uses skill_scanner LLM config)
--llm-modeltextnoLLM model override (e.g. claude-sonnet-4-20250514, gpt-4)
--llm-providertextnoLLM provider hint (anthropic, openai, ollama, etc.)
--llm-consensus-runsintegernoNumber of LLM consensus runs (default: 1)
--enable-meta, --no-metabooleantruenoEnable/disable meta analyzer (default: enabled)
--lenientbooleannoSuppress low-confidence findings (sets min_confidence=0.5)

Usage

Scan and list plugins

defenseclaw plugin scan ./extensions/defenseclaw --json --profile strict
defenseclaw plugin list --json

--profile selects the scanner profile passed to the plugin scanner.

Install or quarantine

defenseclaw plugin install ./extensions/defenseclaw --force --action quarantine
defenseclaw plugin info defenseclaw --json

Use info before changing enforcement state.

Related