Every molt leaves a mark. Trace. Verify. Trust.
Tamper-evident audit trail for OpenClaw agent runs. Silently taps the wire, captures every trace, and seals them in a SHA-256 hash chain. Not a proxy or firewall — a passive observer.
cargo install --path .
Continuous recording to a single ledger with auto-reconnect and exponential backoff.
Query agent activity from Claude Desktop or Claude Code via natural language.
Detect destructive ops, prompt injection, privilege escalation, and cost anomalies.
SHA-256 chain for every trace. Tamper with one event, the whole chain breaks.
Auto-redacts API keys, tokens, JWTs, AWS keys, GitHub PATs before storage.
Browse impressions, filter traces, search payloads, inspect evidence breakdowns.
Reconstruct agent runs with chat output, tool calls, and timeline.
Prebuilt binaries for Linux, macOS, and Windows. Single binary, no dependencies.
# Record a session clawprint record --gateway ws://127.0.0.1:18789 --out ./clawprints # Open dashboard in browser clawprint open --out ./clawprints # 24/7 daemon mode clawprint daemon --gateway ws://127.0.0.1:18789 --out ./clawprints # Verify hash chain integrity clawprint verify --run <run_id> --out ./clawprints # Start MCP server for Claude Desktop clawprint mcp --out ./clawprints