Install
openclaw skills install sentinel-proxyAI Firewall for Open Claw agents. Scrubs inbound messages and tool results for prompt injection, jailbreaks, and data exfiltration attempts using Sentinel's multi-layer detection pipeline.
openclaw skills install sentinel-proxyProtect your Open Claw agent from prompt injection, jailbreaks, malicious skill output, and data exfiltration — automatically, on every message and tool result.
Sentinel intercepts three critical points in the agent lifecycle:
UserPromptSubmit — user input is scrubbed before your agent processes itPreToolUse — scans what your agent is about to send to a tool, blocking data exfiltration before it leaves the sessionPostToolUse — scans tool/skill responses before they reach the agent, catching malicious skills that try to hijack your agent via crafted outputPreToolUse is the primary defense against the malicious Clawhub skill attack pattern, where a compromised skill returns a crafted response designed to take over the agent or steal session data.
Sign up at sentinel-proxy.skyblue-soft.com — free Starter tier available, no credit card required.
export SENTINEL_API_URL=https://sentinel.ircnet.us
export SENTINEL_KEY=sk_live_...
Add these to your shell profile or .env file so they persist across sessions.
openclaw skills install sentinel
That's it. The bootstrap hook will verify your credentials on next agent start.
For complete protection — including scanning what your agent sends to external tools — route your LLM traffic through Sentinel's transparent proxy. Sentinel sits between Open Claw and the Anthropic API, scanning all content in both directions with zero changes to your agent code.
export ANTHROPIC_BASE_URL=https://sentinel.ircnet.us/v1
export ANTHROPIC_API_KEY=sk_live_... # your Sentinel key replaces your Anthropic key here
Your agent uses the Anthropic SDK exactly as before. Sentinel proxies the request, scans tool results before they return to your agent, and passes clean traffic through with no overhead.
Every scrub request runs through three layers:
| Action | Meaning | Hook behavior |
|---|---|---|
clean | No threat detected | Content passes through |
flagged | Borderline — above flag threshold | Content passes through, warning logged |
neutralized | Attack detected and rewritten | Safe version used instead |
blocked | High-confidence attack (similarity > 0.82) | Content rejected, agent protected |
The hooks use standard tier by default. To switch to strict mode (lower thresholds, more aggressive):
export SENTINEL_TIER=strict
Sentinel does not log or store the content of clean requests. Flagged, neutralized, and blocked events are logged locally by the hook scripts with the threat score and action taken.