Sandboxing only
Contains runtime damage, but still allows risky actions to start. CordClaw decides before execution.
CordClaw is the OpenClaw plugin that asks Cordum for a deterministic allow/deny/approval decision before any action runs. Policy enforcement at the execution boundary, not in-prompt.
Request Path
OpenClaw
Gateway Plugin Hook
CordClaw
Local Go Daemon
Cordum
Safety Kernel
Decision returned before execution: ALLOW, DENY, THROTTLE, REQUIRE_HUMAN, CONSTRAIN.
OpenClaw's security model assumes a single trusted operator boundary. Its own documentation states that for mixed-trust or adversarial users, separate gateways and hosts are recommended. But most production deployments have multiple agents, multiple teams, and actions with varying risk levels. There is no built-in way to enforce "this agent can read files but cannot execute shell commands" or "this action requires human approval before it runs."
CordClaw fills that gap. It sits at the OpenClaw gateway layer and evaluates every action against policy rules before the tool executes. If the policy says deny, the action never starts. If the policy says require approval, the action waits for a human. Every decision is logged with the policy version that produced it.
CordClaw is an open-source plugin that intercepts every OpenClaw action request, evaluates it against policy rules, and returns a deterministic decision before anything executes.
CordClaw works standalone with a local policy daemon. No external dependencies required. When you are ready for centralized governance across multiple agents, connect CordClaw to a Cordum instance for fleet-wide policy management, approval workflows, and consolidated audit trails.
Start standalone. Upgrade to connected when you need it. No code changes required.
Teams shipping OpenClaw agents to production
You need to prove that dangerous actions are blocked before they run, not after.
Security and compliance teams
You need audit evidence that every agent action was evaluated against policy before execution.
Platform engineers managing agent fleets
You need centralized governance across multiple agents, teams, and environments.
CordClaw is built for deterministic pre-dispatch control, not post-hoc visibility.
Contains runtime damage, but still allows risky actions to start. CordClaw decides before execution.
Tells you what happened after the fact. CordClaw blocks or gates actions up front.
Policy text can be bypassed by prompt injection. CordClaw evaluates structured metadata outside context.
Every action request maps to a typed decision and reason before execution.
Low-risk action executes immediately.
exec: npm test
Dangerous action is blocked before execution.
exec: rm -rf /
Action is rate-limited to reduce blast radius.
exec: npm install (burst)
Execution pauses until a reviewer approves.
message-send: external notice
Action runs with enforced limits (sandbox, timeout, paths).
exec: go test ./... with 30s timeout
A practical view of where pre-dispatch policy enforcement fits.
| Capability | CordClaw | NemoClaw | SecureClaw | Native OpenClaw |
|---|---|---|---|---|
| Enforcement point | Pre-dispatch | Runtime sandbox | In-context | Config allow/deny |
| Decision types | 5 | 2 | 2 | 2 |
| Prompt-injection resistance | Yes (structured) | Yes | No | No |
| Human approval flow | Native | No | No | Limited |
| Audit trail depth | Full decision trail | Partial | Minimal | Minimal |
What CordClaw actually does when an OpenClaw agent tries to run a dangerous command.
Policy config
profile: strict
daemon:
timeoutMs: 500
failMode: "deny" # if daemon unreachable, block the action
rules:
- id: deny-destructive-commands
match:
tool: exec
command_pattern: "rm -rf|drop table|shutdown"
decision: deny
reason: "Destructive commands are blocked"
- id: approve-prod-writes
match:
tool: file_write
environment: production
decision: require_human
reason: "Production file writes need approval"
- id: allow-reads
match:
tool: exec
command_pattern: "ls|cat|echo|grep"
decision: allowTerminal output
$ openclaw cordclaw simulate --tool exec \
--command "echo hello"
Decision: ALLOW
Reason: Matched rule allow-reads
Latency: 2ms (cached)
$ openclaw cordclaw simulate --tool exec \
--command "rm -rf /tmp/data"
Decision: DENY
Reason: Destructive commands are blocked
Rule: deny-destructive-commands
Latency: 3ms (cached)
$ openclaw cordclaw simulate --tool file_write \
--env production --path "/etc/config"
Decision: REQUIRE_HUMAN
Reason: Production file writes need approval
Rule: approve-prod-writes
Latency: 41ms (daemon)
$ openclaw cordclaw audit --limit 3
ID TOOL DECISION RULE
a1b2c3 exec ALLOW allow-reads
d4e5f6 exec DENY deny-destructive-commands
g7h8i9 file_write REQUIRE_HUMAN approve-prod-writesStandalone mode: audit entries stored locally. Connected mode: forwarded to Cordum for centralized audit trails and fleet-wide dashboards.
Start with local setup, run your first simulation, then connect CordClaw to the full Cordum stack.
cd setup OPENCLAW_SKIP=true ./install.sh # first decision openclaw cordclaw simulate --tool exec --command "echo hello" # destructive command (expected DENY) openclaw cordclaw simulate --tool exec --command "rm -rf /" # inspect audit trail openclaw cordclaw audit --limit 20
CordClaw adds governance without blocking your agent pipeline.
Cached policy decision
<5ms
Hot path with local policy cache
Warm decision (daemon)
<50ms
Daemon-resolved policy evaluation
Decision types supported
5
ALLOW, DENY, THROTTLE, REQUIRE_HUMAN, CONSTRAIN
Enterprise
Bring pre-dispatch controls, approval gates, and auditable decision trails to production AI agent workflows.