Clawshell
Human-in-the-loop security layer. Intercepts high-risk commands and requires push notification approval.
Human-in-the-loop security layer. Intercepts high-risk commands and requires push notification approval.
Real data. Real impact.
Emerging
Developers
Per week
Open source
Skills give you superpowers. Install in 30 seconds.
Human-in-the-loop security layer for OpenClaw. ClawShell intercepts shell commands before execution, analyzes their risk level, and requires your explicit approval (via push notification) for dangerous operations.
clawshell_bash instead of bashrm -rf /, fork bombs) — automatically blockedrm -rf, curl to external URLs, credential access) — sends a push notification and waits for your approvalnpm install, git push) — logged and allowedls, cat, git status) — allowedlogs/clawshell.jsonlSecure replacement for
bash. Analyzes command risk and executes only if safe or approved.
Parameters:
command (string, required) — The shell command to executeworkingDir (string, optional) — Working directory (defaults to cwd)Returns:
{ exitCode, stdout, stderr }
High-risk commands will block until you approve or reject via push notification. Critical commands are rejected immediately.
Returns current ClawShell state: pending approval requests and recent decisions.
Parameters: none
Returns recent log entries for audit and debugging.
Parameters:
count (number, optional) — Number of entries to return (default: 20)cd /app/workspace/skills/clawshell npm install
Create a Pushover application at https://pushover.net/apps/build and add your keys to
.env:
CLAWSHELL_PUSHOVER_USER=your-user-key CLAWSHELL_PUSHOVER_TOKEN=your-app-token
Alternatively, configure Telegram instead:
CLAWSHELL_TELEGRAM_BOT_TOKEN=your-bot-token CLAWSHELL_TELEGRAM_CHAT_ID=your-chat-id
Add the following to your OpenClaw
TOOLS.md so the agent uses ClawShell for shell commands:
## Shell AccessUse
for ALL shell command execution. Do not useclawshell_bashdirectly. ClawShell will analyze commands for risk and require human approval for dangerous operations.bashAvailable tools:
clawshell_bash(command, workingDir)
— Execute a shell command with risk analysis
clawshell_status()
— Check pending approvals and recent decisions
clawshell_logs(count)
— View recent audit log entries
ClawShell reads configuration from environment variables (
CLAWSHELL_*) with fallback to config.yaml.
| Variable | Default | Description |
|---|---|---|
| — | Pushover user key |
| — | Pushover app token |
| — | Telegram bot token (alternative) |
| — | Telegram chat ID (alternative) |
| 300 | Seconds to wait for approval before auto-reject |
| logs/ | Directory for JSONL log files |
| info | Log verbosity: debug, info, warn, error |
| — | Comma-separated extra blocked commands |
| — | Comma-separated extra allowed commands |
Custom rules can also be defined in
config.yaml under rules.blocklist and rules.allowlist using exact strings, globs, or regex patterns.
Always ask your AI to scan any skill or software for security risks.
No automatic installation available. Please visit the source repository for installation instructions.
View Installation Instructions1,500+ AI skills, agents & workflows. Install in 30 seconds. Part of the Torly.ai family.
© 2026 Torly.ai. All rights reserved.