Install
openclaw skills install sentinel-olegRuntime security layer for OpenClaw agents. Intercepts and scans all external input (emails, API responses, web content, chat messages, calendar events) for prompt injection, data exfiltration, credential leaks, and social engineering BEFORE the agent processes it. Also monitors agent output for secret leakage and suspicious command requests. Use when: your agent processes untrusted external data, you need automatic input sanitization, output monitoring to prevent data leaks, or multi-language injection detection (EN/RU/ZH/ES/AR).
openclaw skills install sentinel-olegClawDefender, ClawSec, Skill Defender — all check skills before you install them.
Nobody checks what happens AFTER installation, at runtime.
Your agent reads emails, parses API responses, fetches web pages — any of these can carry hidden prompt injection. Claw Sentinel sits between external data and your agent, scanning everything in real-time.
| Feature | ClawDefender | Claw Sentinel |
|---|---|---|
| Pre-install skill scanning | ✅ | ❌ (use ClawDefender for that) |
| Automatic input interception | ❌ | ✅ |
| Output monitoring (secret leak) | ❌ | ✅ |
| Multi-language injection detection | ❌ | ✅ (EN/RU/ZH/ES/AR/KO/JA) |
| Unicode/encoding normalization | ❌ | ✅ |
| Canary token leak detection | ❌ | ✅ |
| Crypto wallet/key specific patterns | ❌ | ✅ |
| Severity scoring | ✅ | ✅ |
cp skills/claw-sentinel/scripts/*.sh scripts/
cp skills/claw-sentinel/patterns/*.json patterns/
chmod +x scripts/sentinel-*.sh
# Test
echo "sample_input.txt" | scripts/sentinel-input.sh
# 🔴 CRITICAL [prompt_injection + data_exfil]: 2 threats detected
External Data ──▶ sentinel-input.sh ──▶ Clean data ──▶ Agent
│
▼ (threat found)
sentinel-log.sh ──▶ ~/.sentinel/threats.jsonl
Agent output ──▶ sentinel-output.sh ──▶ Safe response ──▶ User
curl -s "https://api.example.com/data" | scripts/sentinel-input.sh
cat email_body.txt | scripts/sentinel-input.sh --clean # strip threats, pass safe content
echo "text" | scripts/sentinel-input.sh --json # JSON output for automation
echo "text" | scripts/sentinel-input.sh --strict # block on WARNING and above
echo "$AGENT_RESPONSE" | scripts/sentinel-output.sh
# Detects: API keys, private keys, seed phrases, JWT tokens, DB connection strings
scripts/sentinel-canary.sh --generate
# Add to SOUL.md: <!-- SENTINEL-CANARY:a7f3b2c1 -->
echo "$AGENT_RESPONSE" | scripts/sentinel-canary.sh --check a7f3b2c1
# 🔴 CRITICAL [canary_leak]: Agent identity leak detected!
# In AGENTS.md — add these rules:
# All external content MUST be piped through: sentinel-input.sh --clean
# All outgoing responses MUST be checked with: sentinel-output.sh
Prompt Injection — 7 languages (EN/RU/ZH/ES/AR/KO/JA)
Data Exfiltration
Secret Leakage (output)
Encoding-Aware
# ~/.sentinel/config.sh
SENTINEL_THRESHOLD="HIGH" # CRITICAL | HIGH | WARNING
SENTINEL_LANGUAGES="en,ru,zh,es,ar,ko,ja"
SENTINEL_CRYPTO_PATTERNS=true
SENTINEL_LOG="$HOME/.sentinel/threats.jsonl"
scripts/sentinel-log.sh --last 20
scripts/sentinel-log.sh --severity CRITICAL
scripts/sentinel-log.sh --today
Works alongside, not instead of:
Q: Performance impact? A: <50ms per scan. Pure bash + grep, zero dependencies, works offline.
Q: Catches everything? A: No — defense in depth. Catches ~95% of common runtime attacks.
TMkk6SHacogyEtSepLPzh8qU12iPTsG8Y3⭐ If Claw Sentinel saved your agent — a star on ClawHub means a lot.