Clawdit is an open-source runtime security tool that intercepts, logs, and enforces policies on every tool call your AI agent makes. The black box recorder for the agentic era.
Works with every agent framework
AI agents can read your files, call APIs, execute code, and access secrets. When something goes wrong, there's no audit trail, no policy enforcement, and no way to replay what happened.
Endor Labs found that 82% of 2,614 MCP server implementations have file system operations prone to path traversal. Your agent's tools are the attack surface.
Hidden instructions in MCP tool descriptions succeed 84.2% of the time when agents have auto-approval enabled. Scanners can't catch what happens at runtime.
Every runtime protection solution is commercial and enterprise-only. Developers and hackers have no open-source tool to enforce policies on agent tool calls in real time.
Single binary, no dependencies. Works on macOS, Linux, Windows. No cloud account, no API keys, no infrastructure.
brew install clawdit
Clawdit sits between your agent and its tools as a transparent proxy. It captures every request, response, and decision chain — locally on your machine.
clawdit watch
Write declarative rules: block SSH key access, flag secret leaks, rate-limit tool calls. Ship with sensible defaults. Contribute rules to the community.
clawdit scan --rules owasp-agents
Search your audit log by date, tool, agent, or anomaly. Export compliance reports that map directly to OWASP and AIUC-1 requirements.
clawdit report --format html
Agent gets hijacked mid-session by hidden instructions in tool responses, emails, or documents. Clawdit detects the behavioral deviation and blocks it.
Agent reads ~/.ssh, .env, or API keys and tries to send them outbound. Policy rules catch the pattern and block the call before data leaves your machine.
Agent calls fetch_customer_records 500 times in 2 minutes. Baseline is 5/hour. Clawdit flags the spike and auto-throttles before damage is done.
MCP tool descriptions change after approval, or chain clean tools into malicious sequences. Clawdit monitors tool schemas and blocks unauthorized changes.
Built in public. Designed for contributors.
Single binary installs via brew or go install. Intercepts agent tool calls, logs everything to local SQLite, provides a query interface and HTML audit report generator. Works with any agent framework. No server, no cloud, no account.
MCP proxy mode with full transport interception. YAML policy engine with community-contributed detection rules. Real-time anomaly detection and alerting. Self-hosted dashboard for visualizing agent behavior across sessions.
AIUC-1 and OWASP compliance report mapping. Centralized log aggregation for teams. SIEM integrations (Datadog, Splunk, Sentinel). Tamper-proof audit trails with cryptographic signing. SSO and RBAC for enterprise deployments.
Join the waitlist. Get early access to the CLI, contribute rules, and help shape the roadmap.