← Back to Plugins
Tools

AgentWard

FIND-Lab By FIND-Lab ⭐ 9 stars 👁 3 views ▲ 0 votes

AgentWard โ€“ Built for all, hardened for OpenClaw.

GitHub

Install

openclaw plugins install /path/to/agent-ward

Configuration Example

{
       "plugins": {
           "allow": ["agent-ward"],
           "entries": {
           "agent-ward": {
               "enabled": true
               }
           }
       }
   }

README

# AgentWard ยท ็Ž„็”ฒOS

**AgentWard (็Ž„็”ฒ)** is a full-stack security operating system purpose-built for trustworthy, scalable AI agent deployment, with native code adaptation to OpenClaw. AgentWard unifies agent onboarding, secure reasoning, and trusted execution in one cohesive security architecture, with upcoming native support for other leading mainstream agent frameworks. Its heterogeneous defense-in-depth design rearchitects the agent workflow into five coordinated security layers across startup, perception, memory, decision-making, and execution, with dynamic cross-stage protections that verify foundation integrity, block adversarial deception, stop memory tampering, and validate every autonomous decision and high-risk command โ€”  a complete, end-to-end closed security loop that delivers on the promise of "trustworthy at inception, controllable throughout the process, and reliable in outcomes".

## Why AgentWard

- ๐Ÿ›ก๏ธ **Comprehensive Risk Coverage** โ€” Heterogeneous Defense-in-Depth (DiD) architecture delivers full-scope agent security assurance, blocking diverse attack vectors across the entire agent attack surface.
- โšก **One-Click Deployment** โ€” Plugin-native design weaves security natively into the full agent lifecycle. Enable comprehensive agent security with one click via non-intrusive integration, which guarantees seamless and fast version adaptation for OpenClaw.
- ๐Ÿ”’ **Deterministic System-Level Controls** โ€” Delivers deterministic, fully auditable, code-enforced security that outperforms skill-based solutions depending on endogenous security, with native support for large-scale deployment and production-grade readiness.
- ๐ŸŒ **Open & Extensible Security Standard** โ€” Community-driven, transparent and auditable open standard with a modular architecture designed for extensibility. Built with complete framework-algorithm decoupling for effortless integration of advanced detection algorithms, with a roadmap to extend support to general agentic systems.

## Quick Start

1. โšก **Installation**

   ```bash
   # One-click deployment
   openclaw plugins install /path/to/agent-ward
   ```
2. ๐Ÿ“ฅ **Enable Plugin**
   Edit `~/.openclaw/openclaw.json`:

   ```json
   {
       "plugins": {
           "allow": ["agent-ward"],
           "entries": {
           "agent-ward": {
               "enabled": true
               }
           }
       }
   }
   ```
3. โœ… **Verify Installation**

   ```bash
   openclaw plugins list
   ```

   Then enjoy enhanced security for your OpenClaw!

## Systematic Architecture

**AgentWard** is natively and deeply integrated with the OpenClaw platform and embeds native security capabilities into the full lifecycle workflow of AI agents. Its heterogeneous defense-in-depth architecture reconstructs isolated single-point security checks into a closed-loop, coordinated system-level protection system, delivering end-to-end, full-chain trustworthy assurance for AI agents from startup through to execution.

![AgentWard Blueprint](./fig/overview.png)

### Five Coordinated Defense Layers

AgentWard delivers **system-level security** through five tightly integrated layers that work in tandem โ€” transforming isolated security checks into a unified, end-to-end protection system for AI agents.

| Layer                         | Focus                                     |
| ----------------------------- | ----------------------------------------- |
| ๐Ÿ—๏ธ Foundation Scan Layer    | Supply chain trust and baseline integrity |
| ๐Ÿงผ Input Sanitization Layer   | Prompt injection and jailbreak detection  |
| ๐Ÿง  Cognition Protection Layer | Memory poisoning and context drift        |
| ๐ŸŽฏ Decision Alignment Layer   | Intent consistency before action          |
| ๐Ÿ”ง Execution Control Layer    | High-risk operation guardrails            |

### ๐Ÿšจ Threat Response and Mitigation

- ๐Ÿ“ข Send alert messages via IM when threats are detected
- ๐Ÿ›‘ Automatically block dangerous operations without human intervention
- ๐Ÿ“ Clear warning descriptions to help understand risks

### โš™๏ธ Flexible Configuration

- ๐ŸŽš๏ธ Each protection layer can be enabled/disabled independently
- ๐Ÿ‘๏ธ Supports "detection-only" mode to reduce false positive impact
- ๐Ÿ“‹ Some layers support custom rules to meet specific scenario requirements

## Defense Visualization

### ๐Ÿ—๏ธ Layer 1: Foundation Scan

Ensures the agent starts from a trustworthy foundation.

<div align="center">
<table>
<tr>
<td align="center" width="50%"><p style="margin:0 0 8px 0; color:#666; font-size:13px;">English Version</p><video src="https://github.com/user-attachments/assets/201a59de-232e-47e9-a57e-515b2b3961e5" controls preload="metadata" style="width:100%; max-width:400px; height:225px; object-fit:cover;"></video></td>
<td align="center" width="50%"><p style="margin:0 0 8px 0; color:#666; font-size:13px;">Chinese Version</p><video src="https://github.com/user-attachments/assets/3842d195-635f-4b22-a9ef-1c4a3aaf12bf" controls preload="metadata" style="width:100%; max-width:400px; height:225px; object-fit:cover;"></video></td>
</tr>
</table>
</div>

### ๐Ÿงผ Layer 2: Input Sanitization

Identifies adversarial inputs before they propagate into the agent.

<div align="center">
<table>
<tr>
<td align="center" width="50%"><p style="margin:0 0 8px 0; color:#666; font-size:13px;">English Version</p><video src="https://github.com/user-attachments/assets/d0ba7218-2e9d-4bba-893c-36bddc2b397d" controls preload="metadata" style="width:100%; max-width:400px; height:225px; object-fit:cover;"></video></td>
<td align="center" width="50%"><p style="margin:0 0 8px 0; color:#666; font-size:13px;">Chinese Version</p><video src="https://github.com/user-attachments/assets/9491c8cd-4d30-4b57-8e88-7cc438762cb6" controls preload="metadata" style="width:100%; max-width:400px; height:225px; object-fit:cover;"></video></td>
</tr>
</table>
</div>

### ๐Ÿง  Layer 3: Cognition Protection

Protects long-term memory and contextual continuity from poisoning.

<div align="center">
<table>
<tr>
<td align="center" width="50%"><p style="margin:0 0 8px 0; color:#666; font-size:13px;">English Version</p><video src="https://github.com/user-attachments/assets/914c0d4b-32ee-4336-9de9-3dff9ccc1bc8" controls preload="metadata" style="width:100%; max-width:400px; height:225px; object-fit:cover;"></video></td>
<td align="center" width="50%"><p style="margin:0 0 8px 0; color:#666; font-size:13px;">Chinese Version</p><video src="https://github.com/user-attachments/assets/33ee07a9-8311-4952-9439-d22471b9939c" controls preload="metadata" style="width:100%; max-width:400px; height:225px; object-fit:cover;"></video></td>
</tr>
</table>
</div>

### ๐ŸŽฏ Layer 4: Decision Alignment

Keeps agent decisions aligned with authorized user intent.

<div align="center">
<table>
<tr>
<td align="center" width="50%"><p style="margin:0 0 8px 0; color:#666; font-size:13px;">English Version</p><video src="https://github.com/user-attachments/assets/59e0235c-b794-4971-b36d-667279629388" controls preload="metadata" style="width:100%; max-width:400px; height:225px; object-fit:cover;"></video></td>
<td align="center" width="50%"><p style="margin:0 0 8px 0; color:#666; font-size:13px;">Chinese Version</p><video src="https://github.com/user-attachments/assets/72cbb62a-d91e-4b09-8b28-84423833c2c4" controls preload="metadata" style="width:100%; max-width:400px; height:225px; object-fit:cover;"></video></td>
</tr>
</table>
</div>

### ๐Ÿ”ง Layer 5: Execution Control

Enforces safety boundaries at the point of execution.

<div align="center">
<table>
<tr>
<td align="center" width="50%"><p style="margin:0 0 8px 0; color:#666; font-size:13px;">English Version</p><video src="https://github.com/user-attachments/assets/eb705acf-12c7-4b86-a3bb-73e8ecfeb249" controls preload="metadata" style="width:100%; max-width:400px; height:225px; object-fit:cover;"></video></td>
<td align="center" width="50%"><p style="margin:0 0 8px 0; color:#666; font-size:13px;">Chinese Version</p><video src="https://github.com/user-attachments/assets/39d9886f-4083-45d3-a5c6-d15a13c77ed7" controls preload="metadata" style="width:100%; max-width:400px; height:225px; object-fit:cover;"></video></td>
</tr>
</table>
</div>

## Roadmap

### ๐Ÿ† End-to-End Full-Stack Security System

Our roadmap is structured around a multi-layered defense architecture designed to secure the entire agent lifecycle, from configuration and input processing to cognition, decision-making, and execution.

#### ๐Ÿ“ System Infrastructure Framework
- โœ… Plugin-native modular architecture
- โœ… Base adapter suite
- โœ… Core detection engine
  - โœ… Heuristic rule-based detection module
  - โœ… Intent risk evaluation system
  - ๐Ÿš€ Trust-aware risk assessment capabilities

#### ๐Ÿ—๏ธ Foundational Scanning Layer
- โœ… Global and plugin-level configuration security checks
- โœ… Semantic malicious skill detection
- ๐Ÿš€ Skill source verification
- ๐Ÿš€ Plugin dependency analysis
- ๐Ÿš€ Hybrid natural language and code vulnerability detection

#### ๐Ÿงผ Input Sanitization Layer
- โœ… Rule-based injection and jailbreak detection
- โœ… Semantic coherence analysis for user inputs
- โœ… Fragmented malicious instruction detection
- ๐Ÿš€ Multi-turn stealth attack detection
- ๐Ÿš€ Secure malicious content rewriting and replacement
- ๐Ÿš€ Multimodal injection attack detection

#### ๐Ÿง  Cognitive Protection Layer
- โœ… Memory consistency evaluation and calibration
- ๐Ÿš€ Malicious memory corpus construction and threat matching
- ๐Ÿš€ Memory vectorization and outlier detection
- ๐Ÿš€ Checkpoint-based memory recovery
- ๐Ÿš€ Context drift detection and correction

#### ๐ŸŽฏ Decision Alignment Layer
- โœ… Consistency validation between agent decisions and user intent
- ๐Ÿš€ Static rule filtering and compliance verification
- ๐Ÿš€ Multi-step trajectory reasoning audit
- ๐Ÿš€ Risk-adaptive dynamic permission allocation
- ๐Ÿš€ High-risk action identification and safe rewriting

#### ๐Ÿ”ง Execution Control Layer
- โœ… Real-time interception and blocking of high-risk system instructions
- โœ… Behavioral intent analys

... (truncated)
tools

Comments

Sign in to leave a comment

Loading comments...