NullClaw | Autonomous AI Ecosystem
Security
Security controls are implemented in src/security/* and enforced during runtime/tool execution.
Core Security Modules
pairing.zig: pairing and token guardspolicy.zig: command/path risk controlssandbox.zig+ adapters (landlock,firejail,bubblewrap,docker,detect)audit.zigandtracker.zig: security-relevant event trackingsecrets.zig: secret handling helpers
Default Security Posture
- local-first bind defaults
- pairing required by default
- policy checks before sensitive operations
- path and command restrictions on tool execution
Operational Verification
nullclaw doctor
nullclaw status
nullclaw capabilities --json
High-Impact Config Keys
gateway.require_pairinggateway.allow_public_bindautonomy.allowed_commandsautonomy.allowed_pathssecurity.sandbox.backendsecurity.audit.*
Production Guidance
- keep pairing enabled outside trusted localhost workflows
- avoid broad command/path allowlists
- treat
capabilitiesoutput as final authority for what can execute