Skip to content
Cisco AI Defense logo
CiscoAI Security

Zero to governed — DefenseClaw

Overview

This walkthrough is the minimum number of commands needed to get DefenseClaw from zero to a state where every LLM call through OpenClaw is inspected, skills and MCP servers are scanned on load, and audit events land in your SIEM. Every step below links to a dedicated page with flag reference, generated artifacts, verification, and rollback.

The 10-step happy path

Rendering diagram…

Every step is idempotent — re-running is safe and only prints "preserved" for objects already in place.

Step-by-step

#CommandWhat it doesPage
1defenseclaw initCreates ~/.defenseclaw/, seeds policies, initializes SQLite audit DB, generates the Ed25519 device key, writes default configinit
2defenseclaw setup skill-scannerVerifies the skill_scanner Python SDK is importable, applies scanner defaultsskill-scanner
3defenseclaw setup mcp-scannerVerifies the mcpscanner SDK (needs Python ≥ 3.11), configures default analyzersmcp-scanner
4defenseclaw setup provider add --name ...Adds internal/self-hosted LLM domains to the passthrough allow-list (only if you run one)provider
5defenseclaw setup guardrailInstalls the OpenClaw plugin, patches ~/.openclaw/openclaw.json to route LLM traffic through the guardrail on 4000guardrail
6defenseclaw-gateway startSpawns the Go sidecar as a background daemon, binds REST on 18970 and guardrail on 4000gateway
7defenseclaw keys fill-missingPrompts for every REQUIRED-but-unset credential, persists to ~/.defenseclaw/.env at mode 0600provider keys
8defenseclaw setup observability add <preset>Attaches Splunk O11y, HEC, Datadog, Honeycomb, New Relic, Grafana Cloud, or a generic OTLP/HTTP sinkobservability / Splunk
9defenseclaw setup webhook add slackAdds a chat/incident webhook (Slack, PagerDuty, Webex, or generic HMAC)webhook
10defenseclaw doctorEnd-to-end preflight: binary paths, config, plugin presence, OpenClaw wiring, key resolutiondoctor

Zero-prompt alternative

For CI and first-run automation use defenseclaw quickstart, which runs steps 1, 5, and 6 non-interactively with mode=observe, scanner=local, and no judge, then prints a summary of which REQUIRED API keys are still missing. It is the same code path invoked by make all and curl | bash after install.

Verify everything is wired

defenseclaw status
defenseclaw doctor
curl -s http://127.0.0.1:18970/health | jq .

status prints sidecar PID, guardrail mode, scanner mode, and active sinks. doctor exercises every external dependency (OpenClaw config, plugin, device key, sink tokens) and exits non-zero when any check fails so it's safe in CI.

Related