npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@oktsec/openclaw

v0.2.1

Published

oktsec plugin for OpenClaw - runtime security for AI agent tool calls

Readme

@oktsec/openclaw

npm version License oktsec

Runtime security plugin for OpenClaw. Intercepts agent tool calls and messages, scans through 188 detection rules, and blocks threats before execution.

Install

openclaw plugins install @oktsec/openclaw

Prerequisites

oktsec gateway must be running:

brew install oktsec/tap/oktsec
oktsec run

Quick start

  1. Install the plugin: openclaw plugins install @oktsec/openclaw
  2. Start oktsec: oktsec run
  3. Start OpenClaw: openclaw gateway
  4. Send a message via Telegram, Discord, or the web chat
  5. Open the oktsec dashboard to see every event in real-time

What it intercepts

| Event | Hook | Direction | |-------|------|-----------| | Incoming messages | message_received | User -> Agent | | Outgoing messages | message_sending / message_sent | Agent -> User | | Tool calls (before) | before_tool_call | Agent -> Tool | | Tool results (after) | after_tool_call | Tool -> Agent |

Every intercepted event is scanned through oktsec's security pipeline:

  • 188 detection rules across 15 categories (prompt injection, credential leaks, data exfiltration, supply chain, MCP attacks, and more)
  • 4 verdicts: clean, flag, quarantine, block
  • Tamper-evident audit trail with SHA-256 hash chain and Ed25519 signatures
  • Real-time dashboard and terminal UI

In enforce mode, threats are blocked before they execute. In observe mode, everything is logged without blocking.

Configuration

The plugin works out of the box with default settings. To customize, edit your OpenClaw config:

{
  "plugins": {
    "entries": {
      "oktsec": {
        "enabled": true,
        "config": {
          "gatewayUrl": "http://127.0.0.1:9090",
          "mode": "enforce",
          "agent": "openclaw"
        }
      }
    }
  }
}

| Option | Default | Description | |--------|---------|-------------| | gatewayUrl | http://127.0.0.1:9090 | oktsec gateway endpoint | | mode | enforce | enforce blocks threats, observe logs only | | agent | openclaw | Agent name in oktsec dashboard |

Commands

Chat (slash command)

/oktsec status     # Pipeline health, stats, dashboard URL
/oktsec dashboard  # Show dashboard URL

CLI

openclaw oktsec status       # Gateway health and pipeline stats
openclaw oktsec logs -f      # Stream audit events in real-time
openclaw oktsec dashboard    # Open dashboard in browser

How it works

User (Telegram/Discord/Web)
  │
  ▼
OpenClaw Gateway
  │
  ├── oktsec plugin ──► oktsec gateway (188 rules)
  │                         │
  │                     allow / block
  │                         │
  ▼                         ▼
Agent (Claude/GPT)      Audit trail
  │                    (SHA-256 + Ed25519)
  ├── tool call ──► oktsec plugin ──► scan ──► allow/block
  │
  ▼
Response

The plugin is a thin TypeScript client. All detection, policy enforcement, and audit logging runs in the oktsec Go binary. If the oktsec gateway is unreachable, the plugin fails open and does not block agent work.

Works with NemoClaw

oktsec and NemoClaw are complementary OpenClaw plugins:

| Layer | NemoClaw | oktsec | |-------|----------|--------| | What | Sandbox isolation + NVIDIA inference | Content detection + audit trail | | How | Container boundaries, network allowlists | 188 detection rules, tool-level scanning | | Blocks | Unauthorized network connections | Prompt injection, credential leaks, exfiltration |

Install both for defense in depth:

openclaw plugins install @oktsec/openclaw
openclaw plugins install nemoclaw

Links

License

Apache 2.0