IronClaw Security Guard

ReviewAudited by ClawScan on May 18, 2026.

Overview

This is a coherent security-guard plugin, but it may persist unredacted secrets in local audit logs, so users should review its logging behavior before enabling it.

Use this as a defensive plugin only after reviewing its audit-log behavior. It appears purpose-aligned and not malicious, but configure audit-log location and permissions carefully, and prefer a version that redacts or omits sensitive previews before writing logs.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Secrets, tokens, or private keys may be prevented from being sent externally but still be stored locally in the plugin’s audit log.

Why it was flagged

When outgoing message redaction is triggered, the plugin sends the redacted text onward but passes the original unredacted message content into the audit event preview. Because audit events are written to a local JSONL log, this can persist secrets the plugin was meant to protect.

Skill content
const redaction = redactSecretsInText(event.content); ... await audit.write({ type: "message_sending", severity: "high", ... preview: event.content.slice(0, 1200), blocked: false, }); return { content: `${redaction.text}\n\n[security] Sensitive-looking tokens were redacted before sending.`, };
Recommendation

Redact audit previews before writing them, minimize or disable content previews, restrict audit-log permissions, and document retention/cleanup expectations clearly.

What this means

Legitimate commands or tool calls may be blocked if they match broad safety rules or secret/path heuristics.

Why it was flagged

The plugin can intercept and block tool calls based on its scan results. This is central to the stated security purpose, but users should understand it may stop shell, network, file, or messaging actions.

Skill content
const shouldBlock = !config.monitorOnly && (report.block || report.severity === "critical" || report.severity === "high"); ... return { block: true, blockReason: buildBlockedToolReason(event.toolName, report.findings), };
Recommendation

Review the default rules, use monitorOnly mode during testing if needed, and tune allowlists or blocked patterns for the environment.

What this means

The agent may become more conservative about external content, shell commands, network calls, and secret handling.

Why it was flagged

The plugin injects security guidance into the agent’s prompt context. This is disclosed and defensive, but it does alter the agent’s operating instructions.

Skill content
api.on("before_prompt_build", async () => { ... return { prependSystemContext: SECURITY_PROMPT_GUIDANCE, }; });
Recommendation

Enable this only when those guardrails are desired, and verify that the added guidance does not conflict with local operating policies.