Skip to content

Commit 803a638

Browse files
author
Gemini CLI
committed
feat: v0.1.10 - Minimalist Security Dashboard & Enhanced GUI
1 parent d45730e commit 803a638

File tree

7 files changed

+343
-309
lines changed

7 files changed

+343
-309
lines changed

README.md

Lines changed: 33 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,34 @@ AegisClaw acts as a security envelope around your AI agents, providing sandboxin
1818

1919
- **🐳 Hardened Sandbox**: Executes agent skills in a restricted Docker container (non-root, read-only rootfs, dropped capabilities, seccomp).
2020
- **🛡️ Granular Scopes**: Permission model (e.g., `files.read:/home/user/docs`, `shell.exec`, `net.outbound:github.com`).
21+
- **👁️ Security Visualization**: Active "Security Envelope" indicator confirming sandbox isolation and protection status.
22+
- **🔌 Adapter Health**: Real-time connection monitoring to the OpenClaw agent runtime.
2123
- **🚫 Active Secret Redaction**: Automatically scrubs secrets from logs and console output if they leak.
22-
- **🛑 Emergency Lockdown**: "Panic Button" to instantly kill all running skills and block new executions.
24+
- **🛑 Emergency Lockdown**: "PANIC BUTTON" to instantly kill all running skills and block new executions.
2325
- **✋ Human-in-the-Loop**: TUI-based approval system for high-risk actions.
2426
- **🔐 Secret Encryption**: `age`-based encryption for sensitive API keys.
25-
- **📜 Audit Logging**: Tamper-evident, hash-chained logs with cryptographic verification (GUI + CLI).
27+
- **📜 Audit Logging**: Tamper-evident, hash-chained logs with explainable decision tooltips.
28+
- **🖥️ Web Dashboard**: Modern, dark-mode GUI for live monitoring and management.
29+
30+
## 🖼️ Gallery
31+
32+
### Dashboard
33+
34+
The V4 Dashboard features a dedicated **Security Operations Center** with:
35+
36+
- **Active Security Envelope**: Visual confirmation of sandbox isolation.
37+
- **OpenClaw Status**: Real-time connection health and latency metrics.
38+
- **Explainable Audits**: Tooltips explaining _why_ an action was allowed or denied.
39+
40+
![Dashboard](assets/dashboard_v4.png)
41+
42+
### Audit Timeline
43+
44+
![Audit Log](assets/audit_log.png)
45+
46+
### Skill Registry
47+
48+
![Skill Store](assets/skill_store.png)
2649

2750
## 📦 Installation
2851

@@ -82,20 +105,21 @@ Check the immutable log of actions:
82105
This section shows how to integrate OpenClaw agents with AegisClaw while preserving AegisClaw's security guarantees (sandboxing, scoped permissions, audit logging).
83106

84107
Prerequisites
108+
85109
- AegisClaw built and configured (see Quick Start)
86110
- Docker installed and running
87111
- OpenClaw agent or skill package (container image or source)
88112

89113
Steps
90114

91-
1) Store OpenClaw credentials in AegisClaw secrets
115+
1. Store OpenClaw credentials in AegisClaw secrets
92116

93117
```bash
94118
# Store the OpenClaw API key (example)
95119
./aegisclaw secrets set OPENCLAW_API_KEY sk-openclaw-xxxxx
96120
```
97121

98-
2) Enable/configure the OpenClaw adapter
122+
2. Enable/configure the OpenClaw adapter
99123

100124
AegisClaw includes an OpenClaw adapter that mediates communication between agents and external services. Enable it by creating an adapter config at `~/.aegisclaw/adapters/openclaw.yaml`:
101125

@@ -106,7 +130,7 @@ api_key_secret: "OPENCLAW_API_KEY" # name in aegisclaw secrets
106130
timeout_ms: 5000
107131
```
108132
109-
3) Register your OpenClaw-based skill/agent (manifest)
133+
3. Register your OpenClaw-based skill/agent (manifest)
110134
111135
Create a skill manifest that AegisClaw can run in the sandbox. Example `skills/web-search.yaml`:
112136

@@ -128,7 +152,7 @@ mkdir -p ~/.aegisclaw/skills
128152
cp skills/web-search.yaml ~/.aegisclaw/skills/
129153
```
130154

131-
4) Run the skill with AegisClaw's hardened runtime
155+
4. Run the skill with AegisClaw's hardened runtime
132156

133157
```bash
134158
# Run a registered skill inside the sandbox (example)
@@ -138,11 +162,13 @@ cp skills/web-search.yaml ~/.aegisclaw/skills/
138162
If your deployment runs an external OpenClaw service (instead of containerized skills), ensure AegisClaw's adapter will only allow the necessary egress and that API keys are provided via the secret name in the adapter config. All adapter actions are recorded in AegisClaw's audit log.
139163

140164
Security & Policies
165+
141166
- Use least-privilege scopes for skills (e.g., `files.read:/specific/path` rather than `files.read:/`).
142167
- Require skill signing and verify signatures for production skills.
143168
- Use the TUI approval flow for any skill that requests high-risk scopes.
144169

145170
Troubleshooting
171+
146172
- If a skill cannot reach the OpenClaw endpoint, check the egress proxy/egress rules and the adapter `endpoint` setting.
147173
- Verify secrets are present: `./aegisclaw secrets list`
148174
- Inspect audit logs for denied actions: `./aegisclaw logs`
@@ -179,4 +205,4 @@ Apache 2.0 - See [LICENSE](LICENSE) for details.
179205

180206
---
181207

182-
**Repository Topics:** `security`, `agent-runtime`, `sandbox`, `golang`, `ai-safety`, `docker`, `seccomp`
208+
**Repository Topics:** `security`, `agent-runtime`, `sandbox`, `golang`, `ai-safety`, `docker`, `seccomp`

assets/audit_log.png

111 KB
Loading

assets/banner.png

-27 KB
Loading

assets/dashboard.png

106 KB
Loading

assets/dashboard_v4.png

131 KB
Loading

assets/skill_store.png

112 KB
Loading

0 commit comments

Comments
 (0)