Releasing open source tools for security teams to get visibility into OpenClaw in their environments: openclaw-detect and openclaw-telemetry.
- openclaw-detect:
Shell and PowerShell scripts that detect OpenClaw installations on managed devices.
Checks for CLI binaries, app bundles, config files, gateway services, and Docker artifacts across macOS, Linux, and Windows. Deployable via MDM with docs for Intune, Jamf, JumpCloud, Kandji, and Workspace ONE.
- openclaw-telemetry:
A plugin for OpenClaw that captures tool calls, LLM usage, agent lifecycle, and message events.
Includes sensitive data redaction, tamper-proof hash chains, rate limiting, and log rotation. Outputs to JSONL, with optional CEF/syslog forwarding for SIEM integration (not yet tested).
ddiinn•1h ago
- openclaw-detect: Shell and PowerShell scripts that detect OpenClaw installations on managed devices. Checks for CLI binaries, app bundles, config files, gateway services, and Docker artifacts across macOS, Linux, and Windows. Deployable via MDM with docs for Intune, Jamf, JumpCloud, Kandji, and Workspace ONE.
Repo: https://github.com/knostic/openclaw-detect
- openclaw-telemetry: A plugin for OpenClaw that captures tool calls, LLM usage, agent lifecycle, and message events. Includes sensitive data redaction, tamper-proof hash chains, rate limiting, and log rotation. Outputs to JSONL, with optional CEF/syslog forwarding for SIEM integration (not yet tested).
Repo: https://github.com/knostic/openclaw-telemetry
Thanks! The Knostic team