______ __ ___ _ __ ____ _____ ________________ __ ______ _______
/ ____/ / / / | | / / / __ \ / ___/ / ____/ ____/ / / / / __ \ \/ / ___/
/ / / / / /| | | /| / / / / / / \__ \ / __/ / / / / / / / /_/ /\ / __/
/ /___ / /___/ ___ | |/ |/ / / /_/ / ___/ / / /___/ /___/ /_/ / / _, _/ / / /___
\____/ /_____/_/ |_|__/|__/ /_____/ /____/ /_____/\____/\____/ /_/ |_| /_/_____/
The Hardened, Enterprise-Grade Fork of Moltbot
"Don't let your digital twin become a zombie."
Feature Matrix โข Quick Start โข Architecture โข Contributing
๐ Table of Contents (Click to Expand)
In the age of autonomous agents, convenience often comes at the cost of security. A standard agent listening on 0.0.0.0 is a beacon for botnets.
There are currently 1,000+ exposed AI agents visible on Shodan, potentially leaking chat logs, API keys, and memory.
Clawd Secure is a hardened fork of Moltbot designed for the paranoid. It implements a Zero Trust architecture by default, ensuring that even if your server is breached, your agent's memory and control systems remain secure.
| Security Feature | ๐ Original Moltbot | ๐ก๏ธ Clawd Secure |
|---|---|---|
| Execution User | root (Dangerous) |
clawduser:1001 (Rootless) |
| Network Binding | 0.0.0.0 (Public) |
127.0.0.1 (Localhost Only) |
| API Authentication | โ None | โ X-GATEWAY-TOKEN |
| Memory Storage | ๐ Plaintext JSON | ๐ AES-256-GCM Encrypted |
| Docker Access | ๐ Full Socket Mount | ๐ฎ Socket Proxy (Read-Only) |
| Secret Management | ๐ PBKDF2 Derived Keys |
The system creates a Gatekeeper layer between the internet and your agent, ensuring no direct access to the core logic.
flowchart LR
User([๐ค User]) <-->|HTTPS| RP["Reverse Proxy<br>(Caddy/Nginx)"]
RP <-->|X-GATEWAY-TOKEN| GK["๐ก๏ธ Gatekeeper"]
subgraph "Rootless Container"
GK -->|Protected API| Brain["๐ง Moltbot Core"]
Brain -->|Requests| Ollama["๐ฆ Ollama"]
Brain <-->|Encrypted| Data[("๐ Encrypted DB")]
end
style GK fill:#11c56e,stroke:#333,stroke-width:2px,color:#fff
style Data fill:#f59e0b,stroke:#333,stroke-width:2px,color:#fff
style Brain fill:#3b82f6,stroke:#333,stroke-width:2px,color:#fff
We've automated the hardening process to be as simple as one command.
Tip
One-Click Security
npm run install:secureOutput: Generates your 64-char Authentication Token and AES-256 Encryption Keys automatically.
Deploy the full stack with the secure Docker Socket Proxy.
docker-compose -f docker-compose.secure.yml up -dRun the smoke tests to confirm encryption and authentication are active.
npm run test:smokeAll requests must include your generated token.
curl -H "X-GATEWAY-TOKEN: <your_token>" http://127.0.0.1:3000/healthSee CONTRIBUTING_SECURITY.md for strict security guidelines.
Made with โค๏ธ and Paranoia by the Clawd Secure Team.
Because your agent deserves a bodyguard.