Skip to content
Cisco AI Defense logo
CiscoAI Security

Package tour — DefenseClaw

Overview

Use this page to orient yourself in the codebase. Each entry is one line so the map stays printable. Follow the link in each entry's dedicated README for deeper coverage.

Go: cmd/

PackageRoleStability
cmd/defenseclawGo entrypoint built as defenseclaw-gateway by the MakefileStable
cmd/docgen-goCobra → JSON docs generatorInternal

Go: internal/

PackageRoleStability
internal/gatewaySidecar REST API, OpenClaw WebSocket client, guardrail proxy, provider adapters, judge clientStable (API contracts)
internal/guardrailRule packs, suppressions, sensitive-tool defaults, verdict cacheStable
internal/watcherFilesystem event loop, snapshots, drift, periodic rescanStable
internal/policyOPA host, policy loader, hot-reload, snapshotterStable
internal/auditSQLite writer, retention, export/importStable (schema)
internal/tuiBubbletea TUI + panels + command paletteStable (keybindings)
internal/cliGo-side Cobra commands (start, stop, restart, …)Stable
internal/sandboxOpenShell sandbox supervisorStable (Linux); advisory (macOS/Windows)
internal/firewallEgress observer, rule compiler, SSRF guardStable
internal/configConfig loader, validator, schema enforcementStable
internal/configsEmbedded provider registry and JSON schema dataStable
internal/telemetryOTel wiring, span builder, metric emittersStable (span names)
internal/gatewaylogStructured JSONL event writer and schema validationStable
internal/notifyLocal desktop notification helpersInternal
internal/redactionDisplay and sink redaction helpersStable
internal/scannerScanner contracts and code scanner glueStable
internal/enforceSkill, plugin, and MCP enforcement helpersStable
internal/inventoryInventory model and discovery helpersStable
internal/daemonBackground process management for the sidecarInternal
internal/versionBinary version plumbingInternal

Python: cli/defenseclaw/

PackageRoleStability
cli/defenseclaw/commands/Every Click command (cmd_init.py, cmd_setup.py, …)Stable (CLI surface)
cli/defenseclaw/scanner/Python-side scanner adapters and plugin scanner helpersStable (scanner contract)
cli/defenseclaw/enforce/Python-side enforcement helpersInternal
cli/defenseclaw/inventory/Python inventory helpersInternal
cli/defenseclaw/observability/Local observability setup helpersInternal
cli/defenseclaw/webhooks/Webhook setup and delivery helpersStable

Node / TypeScript: extensions/defenseclaw/

PackageRoleStability
extensions/defenseclaw/src/index.tsOpenClaw plugin entrypointStable (plugin protocol)
extensions/defenseclaw/src/fetch-interceptor.tsfetch interceptor + provider mappingStable
extensions/defenseclaw/src/correlation-headers.tsCorrelation header constants and helpersStable
extensions/defenseclaw/src/client.tsSidecar REST client for the pluginStable

Policies: policies/

PackageRole
policies/rego/admission.regoAdmission decision for scanners
policies/rego/guardrail.regoSeverity/direction/mode → action
policies/rego/firewall.regoURL allow/deny
policies/rego/audit.regoEvent filter logic for sinks
policies/guardrail/default/rules/*.yamlDefault rule pack
policies/guardrail/default/suppressions.yamlDefault suppressions
policies/guardrail/default/sensitive-tools.yamlDefault sensitive tools registry
policies/rego/data.jsonStatic Rego policy inputs

Tests: test/

PackageRole
test/e2e/Black-box end-to-end test data and helpers
test/unit/Unit test fixtures and helpers
test/fixtures/Rule packs, policies, and artifacts used by the above
test/testdata/Shared provider and endpoint corpora

Scripts and tooling: scripts/

PackageRole
scripts/install.shCurl-bash installer
scripts/install-dev.shDevelopment install helper
scripts/upgrade.shUpgrade helper
scripts/setup-llm.shInteractive LLM setup helper
scripts/setup-scanners.shScanner setup helper
scripts/docgen/Python-based documentation generators
scripts/docs_verify.pyDocs-site source-accuracy verifier
scripts/docs_deadlinks.pyDocs-site internal link checker
scripts/test-e2e-*.shE2E shell harnesses

Related