PalveronPalveronDocs

OpenClaw Integration

Control Layer for OpenClaw agents — protection in 2 minutes, 8 automatic rules, BYOM, blockchain proof.

OpenClaw Integration

Your agent runs 24/7. Do you know what it's doing right now?

agent-shield shows you everything your OpenClaw agent does, blocks dangerous actions before they execute and masks your personal data. One command. Zero configuration.

How It Works

OpenClaw Agent → Tool Call → agent-shield (MCP) → {{brand}} Gateway → Policy Check

                                                    ✅ ALLOW → Execute tool
                                                    ✏️ MODIFY → Execute with PII masked
                                                    🚫 BLOCK → Rejected with reason
                                                    ⏸️ APPROVAL → Waiting for approval

Every tool call produces a tamper-evident trace — searchable, filterable, optionally anchored on the Flare blockchain.

Quickstart (2 Minutes)

1. Install the package

npm install -g @{{brand_scope}}/agent-shield

2. Set API key and LLM key

export PALVERON_API_KEY="your-key"          # Dashboard → Settings → API Keys
export PALVERON_API_URL="your-api-url"      # Gateway address
export OPENAI_API_KEY="sk-..."              # Your own LLM key (BYOM)

3. Activate Shield

npx agent-shield init

Output:

✅ API Key validated (Project: "My Project")
✅ Shield activated: 8 protection rules
✅ Agent "MacBook-Pro" registered
✅ Blockchain: SHA-256 hash chain active

4. Restart Gateway

openclaw gateway restart

Done. 8 protection rules are active. Open the dashboard tomorrow morning.

BYOM: Bring Your Own Model

You already have an LLM API key. Our 2-pass system (regex + AI) uses your key for the AI analysis. Our LLM cost per user: effectively zero.

TierLLM KeyWhat happens
CommunityYour ownFull 2-pass engine (regex + AI via your key)
ProYour own+ Neural Custom Policies
BusinessYour own+ Team features
EnterpriseYour own OR ManagedManaged LLM as a premium option

8 Shield Rules (Automatically Enabled)

npx agent-shield init activates all 8 rules immediately. No YAML. No config files.

RuleDetectsAction
Secret Exfiltration ShieldAPI keys, private keys, JWTs in outputBLOCK
Shell Injection Guardcurl|bash, chmod 777, eval()BLOCK
Destructive Actions Shieldrm -rf, DROP TABLE, git push --forceBLOCK
Package Install Watchdognpm/pip/apt install from unknown sourcesAPPROVAL
Social Media Output GuardPII + secrets in outgoing messagesANONYMIZE
GDPR PrivacyEmails, phone numbers, IBANs, SSNsANONYMIZE
High-Speed Circuit BreakerAgent loops (>100 req/min)BLOCK
Fiscal Authority LimitTransactions above a configurable thresholdAPPROVAL

MCP Configuration

agent-shield registers itself automatically as an MCP server. If you'd like to adjust the configuration manually:

{
  "mcpServers": {
    "agent-shield": {
      "command": "npx",
      "args": ["-y", "agent-shield-mcp"],
      "env": {
        "PALVERON_API_URL": "your-api-url",
        "PALVERON_API_KEY": "your-key"
      }
    }
  }
}

MCP Tool

ToolDescription
governance_checkCheck a tool call against governance policies before it executes. Returns ALLOW, BLOCK, MODIFY or APPROVAL.

The agent calls governance_check automatically before executing HIGH-RISK actions (shell, file deletes, package installs, sending messages).

CLI Commands

npx agent-shield init       # Set up shield + register agent
npx agent-shield status     # 24h statistics + active rules
npx agent-shield test       # Run test governance checks
npx agent-shield help       # Show help

Environment Variables

VariableDescription
PALVERON_API_KEYYour project API key (required)
PALVERON_API_URLGateway URL (required)
OPENAI_API_KEYYour LLM key for BYOM 2-pass analysis
AGENT_SHIELD_API_KEYAlternative name for the API key
AGENT_SHIELD_API_URLAlternative name for the API URL

Risk Classification

RiskExample ToolsBehavior
HIGHexec, shell, delete_file, git_push, install_packageAlways governance_check
MEDIUMread_file, write_file, memory_write, navigategovernance_check (fail-open)
LOWlist_directory, searchTrace only, no check

Blockchain Proof

Set up a Flare wallet in the dashboard for cryptographic on-chain proof of every governance decision:

TierWallet ModeGas Fees
CommunityOwn wallet (CUSTOMER_OWNED)You pay (minimal per-transaction cost)
Pro/BusinessManaged OR ownWe pay (Managed)
EnterpriseManaged OR ownIncluded

Without a wallet: a local SHA-256 hash chain provides tamper-evident integrity.

Viewing Traces

Every governance check produces a trace in the dashboard:

  • Filter by framework: openclaw for all OpenClaw checks
  • Filter by tool name (e.g. toolName: exec)
  • Timeline view: every tool call, every minute, searchable
  • Inspect PII findings, policy matches and blockchain status
  • Export as CSV or include in EU AI Act Evidence Packages

On-Premise

{
  "mcpServers": {
    "agent-shield": {
      "command": "npx",
      "args": ["-y", "agent-shield-mcp"],
      "env": {
        "PALVERON_API_URL": "https://gateway.internal.yourcompany.com:8080",
        "PALVERON_API_KEY": "your-key"
      }
    }
  }
}

Next Steps

On this page