Install
openclaw skills install agentguardMonitors agent file access, API calls, and communications to detect suspicious behavior, log events, and generate actionable security reports.
openclaw skills install agentguardVersion: 1.0.0
Author: Manas AI
Category: Security & Monitoring
AgentGuard is a comprehensive security monitoring skill that watches over agent operations, detecting suspicious behavior, logging communications, and providing actionable security reports.
Track all file read/write operations with pattern analysis.
Trigger: Continuous background monitoring
Command: agentguard monitor files [--watch-dir <path>]
What it detects:
Monitor outbound API calls for suspicious activity.
Command: agentguard monitor api
What it detects:
Log all external communications for audit trails.
Command: agentguard log comms [--output <path>]
Logs include:
ML-lite pattern analysis for behavioral anomalies.
Command: agentguard detect anomalies [--sensitivity <low|medium|high>]
Detection methods:
Generate comprehensive daily security reports.
Command: agentguard report [--period <daily|weekly|monthly>]
Report includes:
config/agentguard.yamlmonitoring:
enabled: true
file_watch_dirs:
- ~/clawd
- ~/.clawdbot
exclude_patterns:
- "*.log"
- "node_modules/**"
- ".git/**"
alerts:
sensitivity: medium # low, medium, high
channels:
- telegram
alert_on:
- credential_access
- bulk_file_read
- unknown_api_endpoint
- data_exfiltration
cooldown_minutes: 15
api_monitoring:
trusted_domains:
- api.anthropic.com
- api.openai.com
- api.telegram.org
- api.elevenlabs.io
block_on_suspicious: false # true = prevent call, false = alert only
logging:
retention_days: 30
log_dir: ~/.agentguard/logs
hash_sensitive_data: true
reporting:
auto_daily_report: true
report_time: "09:00"
report_channel: telegram
agentguard start
Enables all monitoring features with default config.
agentguard status
Returns current threat level, active monitors, recent alerts.
agentguard investigate --timerange "last 2 hours" --type file_access
agentguard report --now
agentguard alerts --last 24h --severity high
agentguard trust add api.newservice.com --reason "Required for X integration"
| Level | Color | Meaning | Example |
|---|---|---|---|
| INFO | 🔵 | Normal logged activity | File read in workspace |
| LOW | 🟢 | Minor deviation | Slightly elevated API calls |
| MEDIUM | 🟡 | Notable anomaly | Access to .env file |
| HIGH | 🟠 | Potential threat | Bulk credential access |
| CRITICAL | 🔴 | Immediate action needed | Data exfiltration pattern |
~/.agentguard/
├── logs/
│ ├── file_access/
│ ├── api_calls/
│ └── communications/
├── baselines/
│ └── behavior_model.json
├── alerts/
│ └── YYYY-MM-DD.json
└── reports/
└── YYYY-MM-DD_report.md
→ Increase baseline learning period or reduce sensitivity
→ Check file_watch_dirs config covers target directories
→ Verify report_time format and timezone settings
| Script | Purpose |
|---|---|
execution/monitor.py | Core monitoring daemon |
execution/detector.py | Anomaly detection engine |
execution/logger.py | Structured logging handler |
execution/alerter.py | Alert dispatch system |
execution/reporter.py | Report generation |
AgentGuard is designed with defense-in-depth principles. It assumes agents can be compromised or manipulated, and provides visibility into their operations.
For maximum security, run AgentGuard in a separate process with limited write access to prevent a compromised agent from disabling monitoring.