Cloud API Proxies
Centralized proxying creates one high-impact failure point.
- - Sensitive prompts transit external proxy infrastructure.
- - A proxy outage can stall every downstream request.
- - Control logic and latency budgets become tightly coupled.
Security decisions made by rules, not predictions. Runs locally. No LLM in the security path. Your data stays in your infrastructure.
1,560+ detection patterns · 7 defense layers · 0 LLMs in the security path
Real CVEs, active exploit patterns, and evidence from production systems.
These CVEs are active in tools used by millions of developers. Each one was observed in real-world environments.
Token exfiltration via malicious gatewayUrl override
OS command injection when connecting to untrusted servers
Path traversal via attacker-controlled paths to Git operations
Argument injection when tool inputs become part of a Git command line
Not another proxy and not just an output filter. GuardClaw enforces layered controls before high-impact actions run.
Centralized proxying creates one high-impact failure point.
Checks after generation miss threats that execute earlier.
Deterministic controls run before high-impact actions.
Explore all 7 layers
GuardClaw enforces deterministic controls before the model executes side effects. That design keeps trust boundaries explicit and incident response faster.
Each layer operates independently. An attacker must defeat all seven to compromise an agent.
CVE and IOC pattern matching, crowd-sourced live threat feeds, and configurable blocklists. Users report new attack vectors; approved patterns protect everyone in real time.
Prompt injection detection for tool-call inputs, plus an extensible validation library covering PII redaction, URL/SSRF, path traversal, and command injection. 1,560+ compiled patterns across 11 attack categories.
Deny-by-default YAML policies. Allow, deny, or require approval based on tool, action, resource, actor, provider, and untrusted-source context.
Short-lived, cryptographically signed tokens for every approved action. Single-use, time-bound, scope-limited. HMAC-SHA256 signed and bound to request digest.
Shell wrapper deny-by-default rules, filesystem sandboxing, and HTTP allowlists with SSRF and DNS-rebinding protections.
High-risk operations pause for human approval. Approvals are bound to request digests to prevent TOCTOU attacks. Optional webhooks for notifications.
Cryptographically linked audit trail. Every decision recorded with SHA-256 hash chains. Tamper-evident. Built for compliance and forensics.
Launch simulated attacks and watch GuardClaw's seven layers respond in real time.
Select an attack type to start
brew install guardclaw/tap/guardclaw guardclaw init guardclaw wrap -- your-agent-command Claude MCP
MCP stdio server
Cursor
Shell wrapper
OpenClaw
Guard agent plugin
Docker
Sidecar container
Kubernetes
DaemonSet / sidecar
Cloud Run
Container deployment
All 7 layers. All 1,560+ patterns. Paid tiers coming after beta.
during public beta
Everything you need to start securing your AI agents today.
$49 / month
For teams running multiple agents in production.
$99 / month
Full control for organizations with compliance needs.
Need enterprise features now? Let's talk.
All 7 defense layers, 1,560+ patterns, and 0 LLMs in the security path. Install in 3 minutes. No credit card. No restrictions.