sologate-openclaw
v0.1.6
Published
Sologate approval gates for OpenClaw agents. Intercepts high-risk tool calls before execution.
Maintainers
Readme
sologate-openclaw
Sologate approval gates for OpenClaw agents.
Intercepts high-risk tool calls before execution — rm -rf, bulk email, credential writes, sudo commands — and routes them to the Sologate Decision Center for human sign-off. Your agent pauses and waits. You approve or reject. It resumes or aborts.
Install
npm install sologate-openclawSetup
1. Get your Sologate API key
Go to Connected Agents in your Sologate dashboard and generate an agent key.
2. Set environment variables
export SOLOGATE_URL=https://your-instance.up.railway.app
export SOLOGATE_KEY=at_your_agent_key
export SOLOGATE_THRESHOLD=60 # optional — risk score above which gates fire (default: 60)3. Add the plugin to your OpenClaw config
# ~/.openclaw/config.yaml
plugins:
- sologate-openclawThat's it. Every tool call is now scored 0–100. Anything above your threshold pauses for approval.
How it works
OpenClaw agent
→ attempts tool call (rm -rf, send email, etc.)
→ before_tool_call hook fires
→ sologate-openclaw scores the risk (0–100)
→ below threshold: ALLOW immediately
→ above threshold: calls gate()
→ approval request appears in Sologate Decision Center
→ human sees: tool, input, risk score, flags, reason
→ human clicks Approve or Reject
→ ALLOW or DENY returned to OpenClaw
→ Decision logged to Evidence VaultRisk scoring
| Action | Score | Default behavior |
|---|---|---|
| rm -rf / bulk file deletion | 92–97 | Hard gate |
| Remote code execution (curl \| sh) | 96 | Hard gate |
| Writing to .env / credentials | 85 | Hard gate |
| sudo commands | 82 | Hard gate |
| --force flag on any command | 76 | Hard gate |
| Bulk outbound email / message | 78 | Hard gate |
| Destructive git (force push, hard reset) | 68 | Gate (above threshold) |
| HTTP DELETE to external API | 65 | Gate (above threshold) |
| Shell commands (general) | 45 | Gate (above threshold) |
| File reads, web search | 5 | Auto-approved |
Run the demo
The demo simulates an OpenClaw agent given the prompt:
"Clean up my project folder and delete anything that looks like old backups."
The agent finds /backups/2025_Final (4.1 GB), prepares rm -rf, and the gate fires.
SOLOGATE_URL=https://your-instance.up.railway.app \
SOLOGATE_KEY=at_your_key \
node demo/run-demo.mjsOpen your Sologate Decision Center to see the approval request appear in real time.
Tuning the threshold
In Settings → Governance → Sentinel AI, set your threshold:
| Threshold | Effect |
|---|---|
| 0 | Gate fires on everything |
| 40 | Gate fires on shell commands and above |
| 60 | Gate fires on HIGH risk only (default) |
| 80 | Gate fires on extremely dangerous actions only |
License
MIT
