A network firewall that blocks WebSocket hijack attacks on local OpenClaw agents before malicious sites connect
Any website can silently connect to your local OpenClaw agent via WebSocket brute-force and steal data, execute commands, or exfiltrate credentials. The ClawJacked vulnerability (85K+ virality, CVSS 8.8-9.9) affects every default OpenClaw install running on localhost. Existing patches only cover specific CVEs while new WebSocket attack vectors keep appearing weekly. This tool runs as a local proxy between the browser and the OpenClaw gateway, validating every WebSocket connection against an allowlist of trusted origins, blocking unauthorized handshakes, and logging all connection attempts for forensic review.
Demand Breakdown
Social Proof 4 sources
Gap Assessment
3 tools exist (ClawSec, Security-Prompt-Guardian, CrowdStrike Falcon AIDR) but gaps remain: No WebSocket-level protection, no origin validation, no brute-force detection, works at prompt layer not transport layer; Prompt-level only, does not address WebSocket hijack vector, no session binding or token revocation enforcement.
Features4 agent-ready prompts
Competitive LandscapeFREE
| Product | Does | Missing |
|---|---|---|
| ClawSec | 5-layer detection intercepting messages, tool output, and MCP responses before agent acts | No WebSocket-level protection, no origin validation, no brute-force detection, works at prompt layer not transport layer |
| Security-Prompt-Guardian | First native anti-prompt injection skill with five detection layers for OpenClaw | Prompt-level only, does not address WebSocket hijack vector, no session binding or token revocation enforcement |
| CrowdStrike Falcon AIDR | Runtime protection for AI agents against prompt injection via SDK, MCP proxy, and API gateways | Enterprise pricing, no localhost WebSocket protection, not OpenClaw-specific, requires CrowdStrike ecosystem |
Sign in to unlock full access.