(no title)
ildar | 5 days ago
I've been building something complementary: ClawMoat (https://github.com/darfaz/clawmoat) - host-level security that enforces permission tiers and forbidden zones on file system access and shell commands. Where ClawShell isolates the credentials themselves, ClawMoat restricts what the agent can do with the host: which directories it can read, which commands it can run, network egress control, plus full audit trails.
The "Lethal Trifecta" framing is spot on. I think the defense stack is going to be layered:
1. Process isolation (ClawShell) - credentials never in agent memory 2. Host-level policy (ClawMoat) - agent can't touch ~/.ssh, ~/.aws even if compromised 3. Prompt-level scanning (LlamaFirewall) - catch injection before it reaches the agent 4. Conversation guardrails (NeMo) - keep the agent on-topic
No single layer is sufficient. Microsoft's security blog last week basically confirmed this - they recommend "defense in depth" for agent deployments.
Would be interesting to explore integration - ClawMoat could detect when an agent tries to bypass ClawShell by accessing credential files directly.
No comments yet.