Clawprint

Clawprint

Every molt leaves a mark. Trace. Verify. Trust.

Tamper-evident audit trail for OpenClaw agent runs. Silently taps the wire, captures every trace, and seals them in a SHA-256 hash chain. Not a proxy or firewall — a passive observer.

Install

curl -fsSL https://raw.githubusercontent.com/cyntrisec/clawprint/master/install.sh | bash
Windows? Download clawprint-windows-x86_64.exe from releases.
Or build from source: cargo install --path .

Features

24/7 daemon

Continuous recording to a single ledger with auto-reconnect and exponential backoff.

MCP server

Query agent activity from Claude Desktop or Claude Code via natural language.

Security scanner

Detect destructive ops, prompt injection, privilege escalation, and cost anomalies.

Hash chain ledger

SHA-256 chain for every trace. Tamper with one event, the whole chain breaks.

Secret redaction

Auto-redacts API keys, tokens, JWTs, AWS keys, GitHub PATs before storage.

Web dashboard

Browse impressions, filter traces, search payloads, inspect evidence breakdowns.

Offline replay

Reconstruct agent runs with chat output, tool calls, and timeline.

Cross-platform

Prebuilt binaries for Linux, macOS, and Windows. Single binary, no dependencies.

Quick start

# Record a session
clawprint record --gateway ws://127.0.0.1:18789 --out ./clawprints

# Open dashboard in browser
clawprint open --out ./clawprints

# 24/7 daemon mode
clawprint daemon --gateway ws://127.0.0.1:18789 --out ./clawprints

# Verify hash chain integrity
clawprint verify --run <run_id> --out ./clawprints

# Start MCP server for Claude Desktop
clawprint mcp --out ./clawprints