Install
openclaw skills install vaibot-guardLocal VAIBot Guard skill for OpenClaw. Use to run the guard service, enforce tool decisions via the OpenClaw circuit-breaker plugin, manage approvals, and va...
openclaw skills install vaibot-guardProvide a local policy decision service plus a CLI to gate OpenClaw tool calls and write tamper-evident audit logs in .vaibot-guard/.
VAIBOT_GUARD_TOKEN — bearer token for Guard endpoints (recommended)VAIBOT_API_KEY — optional: anchor receipts to VAIBot /proveTreat these as secrets.
GET /healthPOST /v1/decide/exec + POST /v1/finalize (shell exec flows)POST /v1/decide/tool + POST /v1/finalize/tool (OpenClaw tool gating)POST /v1/approvals/list + POST /v1/approvals/resolve (approve/deny)POST /v1/flush (checkpoint flush)POST /api/proof (Merkle inclusion proofs)Auth:
VAIBOT_GUARD_TOKEN is set, require Authorization: Bearer <token> on protected endpoints.Run the service in the foreground:
export VAIBOT_GUARD_HOST=127.0.0.1
export VAIBOT_GUARD_PORT=39111
export VAIBOT_POLICY_PATH=references/policy.default.json
export VAIBOT_WORKSPACE="$(pwd)"
export VAIBOT_GUARD_LOG_DIR="$VAIBOT_WORKSPACE/.vaibot-guard"
export VAIBOT_GUARD_TOKEN="<random-token>"
node scripts/vaibot-guard-service.mjs
Smoke test:
curl -s http://127.0.0.1:39111/health
Use the OpenClaw circuit-breaker plugin so tool calls are intercepted at the gateway (not just “model follows instructions”).
Reference:
references/openclaw-bridge.mdInstall a user service + env file via the CLI helper:
node scripts/vaibot-guard.mjs install-local
This writes:
~/.config/systemd/user/vaibot-guard.service~/.config/vaibot-guard/vaibot-guard.envTemplates live under references/systemd/ for reference.
See:
references/policy.mdreferences/policy.default.jsonreferences/receipt-schema.mdreferences/checkpoint-schema.mdreferences/inclusion-proofs.mdreferences/required-mode.mdRun guard service tests (no external deps):
node --test tests/guard-service.test.mjs