Skip to content

The Hardened, Enterprise-Grade Fork of Moltbot. ๐Ÿ›ก๏ธ Featuring Zero Trust Architecture, Rootless Docker, Encrypted Memory & Sovereign Ollama Integration.

License

Notifications You must be signed in to change notification settings

CodePhyt/clawdbot-secure

ย 
ย 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

8,295 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

   ______   __    ___ _       __  ____      _____    ________________  __  ______  _______
  / ____/  / /   /   | |     / / / __ \    / ___/   / ____/ ____/ / / / / __ \ \/ / ___/
 / /      / /   / /| | | /| / / / / / /    \__ \   / __/ / /   / / / / / /_/ /\  / __/  
/ /___   / /___/ ___ | |/ |/ / / /_/ /    ___/ /  / /___/ /___/ /_/ / / _, _/ / / /___  
\____/  /_____/_/  |_|__/|__/ /_____/    /____/  /_____/\____/\____/ /_/ |_| /_/_____/  

๐Ÿ›ก๏ธ Clawd Secure

The Hardened, Enterprise-Grade Fork of Moltbot

Security Audited Docker Rootless Zero Trust License MIT


"Don't let your digital twin become a zombie."

Feature Matrix โ€ข Quick Start โ€ข Architecture โ€ข Contributing


๐Ÿ“š Table of Contents (Click to Expand)

๐Ÿ›‘ The "Shodan" Problem

In the age of autonomous agents, convenience often comes at the cost of security. A standard agent listening on 0.0.0.0 is a beacon for botnets. There are currently 1,000+ exposed AI agents visible on Shodan, potentially leaking chat logs, API keys, and memory.

Clawd Secure is a hardened fork of Moltbot designed for the paranoid. It implements a Zero Trust architecture by default, ensuring that even if your server is breached, your agent's memory and control systems remain secure.


๐Ÿ›ก๏ธ Feature Matrix: Why Fork?

Security Feature ๐Ÿ’€ Original Moltbot ๐Ÿ›ก๏ธ Clawd Secure
Execution User root (Dangerous) clawduser:1001 (Rootless)
Network Binding 0.0.0.0 (Public) 127.0.0.1 (Localhost Only)
API Authentication โŒ None โœ… X-GATEWAY-TOKEN
Memory Storage ๐Ÿ“ Plaintext JSON ๐Ÿ” AES-256-GCM Encrypted
Docker Access ๐Ÿ”“ Full Socket Mount ๐Ÿ‘ฎ Socket Proxy (Read-Only)
Secret Management โš ๏ธ Plaintext .env ๐Ÿ”‘ PBKDF2 Derived Keys

๐Ÿ—๏ธ Architecture: Zero Trust

The system creates a Gatekeeper layer between the internet and your agent, ensuring no direct access to the core logic.

flowchart LR
    User([๐Ÿ‘ค User]) <-->|HTTPS| RP["Reverse Proxy<br>(Caddy/Nginx)"]
    RP <-->|X-GATEWAY-TOKEN| GK["๐Ÿ›ก๏ธ Gatekeeper"]
    
    subgraph "Rootless Container"
        GK -->|Protected API| Brain["๐Ÿง  Moltbot Core"]
        Brain -->|Requests| Ollama["๐Ÿฆ™ Ollama"]
        Brain <-->|Encrypted| Data[("๐Ÿ” Encrypted DB")]
    end
    
    style GK fill:#11c56e,stroke:#333,stroke-width:2px,color:#fff
    style Data fill:#f59e0b,stroke:#333,stroke-width:2px,color:#fff
    style Brain fill:#3b82f6,stroke:#333,stroke-width:2px,color:#fff
Loading

๐Ÿš€ Quick Start

We've automated the hardening process to be as simple as one command.

Tip

One-Click Security

npm run install:secure

Output: Generates your 64-char Authentication Token and AES-256 Encryption Keys automatically.

1. Launch (Rootless)

Deploy the full stack with the secure Docker Socket Proxy.

docker-compose -f docker-compose.secure.yml up -d

2. Verify Security

Run the smoke tests to confirm encryption and authentication are active.

npm run test:smoke

๐Ÿ”ง API Usage

All requests must include your generated token.

curl -H "X-GATEWAY-TOKEN: <your_token>" http://127.0.0.1:3000/health

๐Ÿค Contributing

See CONTRIBUTING_SECURITY.md for strict security guidelines.


Made with โค๏ธ and Paranoia by the Clawd Secure Team.
Because your agent deserves a bodyguard.

About

The Hardened, Enterprise-Grade Fork of Moltbot. ๐Ÿ›ก๏ธ Featuring Zero Trust Architecture, Rootless Docker, Encrypted Memory & Sovereign Ollama Integration.

Topics

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • TypeScript 82.5%
  • Swift 13.4%
  • Kotlin 1.9%
  • Shell 0.9%
  • CSS 0.5%
  • JavaScript 0.4%
  • Other 0.4%