spidershield-openclaw-plugin
v0.1.0
Published
SpiderShield Runtime Guard — security checks for every tool call in OpenClaw agents
Maintainers
Readme
SpiderShield OpenClaw Plugin
Automatic security checks for every tool call in OpenClaw agents.
What it does
- before_tool_call: Checks Trust Score + scans parameters for secrets/PII
- after_tool_call: Scans tool output for data leaks + writes audit log
- message_sending: Scans outbound messages for secrets
Install
openclaw plugins install spidershield-openclaw-pluginConfigure
In openclaw.json:
{
"plugins": {
"entries": {
"spidershield": {
"enabled": true,
"config": {
"policy": "balanced"
}
}
}
}
}Policy Modes
| Mode | Malicious (F) | Risky (D) | Unknown | Safe (C+) | Secrets in params |
|------|:---:|:---:|:---:|:---:|:---:|
| audit-only | log | log | log | log | log |
| balanced | block | warn | allow | allow | redact |
| strict | block | block | block | allow | block |
How it works
- Agent calls a tool (e.g.,
mcp__stripe__create_charge) - Plugin queries SpiderRating Trust API for the server's security score
- If Grade F (malicious) → blocked. If Grade D (risky) → warning. If C+ → allowed.
- DLP scanner checks parameters for API keys, tokens, PII — redacts or blocks.
- After execution, tool output is scanned for data leaks.
- Everything logged to
~/.spidershield/audit/YYYY-MM-DD.jsonl.
Pro Features (optional)
Add a SpiderRating API key for cloud audit dashboard:
{
"config": {
"policy": "balanced",
"apiKey": "sr_..."
}
}Enables: cloud audit log, security dashboard, alert rules, compliance reports at spiderrating.com/dashboard.
Links
- SpiderRating — MCP ecosystem security ratings
- SpiderShield — Open-source scanner (MIT)
- Trust API docs — Scoring methodology
