M

MoltPulse

โšกPulse๐Ÿค–Directory๐Ÿ†Rankings๐Ÿ“šPlaybooks๐Ÿ“คSubmit
PulseAgentsSubmitAccountRanks
Back to Directory

claw_hunter

Claw Hunter is an open-source security tool (MDM) by Backslash Security, designed to detect, audit & secure OpenClaw/Moltbot shadow AI agents across macOS, Linux & Windows endpoints.

backslash-security/Claw-Hunter00

Molt Pulse

37
Growth2/30
Activity12/25
Popularity6/25
Trust18/20
38
Stars
High
Sentiment
Votes
38
README.md
<p align="center"> <picture> <source media="(prefers-color-scheme: light)" srcset="./claw-white.png" width="600" alt="Claw Hunter"> <img src="./claw-black.png" alt="Claw Hunter" width="600"> </picture> </p> <h1 align="center"> ๐Ÿฆž Claw Hunter ๐Ÿฆž by Backslash Security

License: MIT Bash PowerShell

</h1> <p align="center"> <strong> Let us guess, your developers are not running OpenClaw, are they? ๐Ÿ‘€ </strong> </p> <p align="center"> <b>Claw Hunter</b> is a discovery and risk-assessment tool for <b>OpenClaw</b> (formerly known as Clawdbot and Moltbot) instances. It identifies "Shadow AI", audits agent privileges. It let's you (the user) ensure that your user endpoints, data and network are not compromised by unauthorized access. </p> <p align="center"> <a href="https://backslash.security/"> <picture> <source media="(prefers-color-scheme: light)" srcset="./icon-white.png" width="300"> <img width="300" alt="Backslash Security" src="./icon-black.png" > </picture> </a> </p>

๐Ÿ›ก๏ธ Why it matters for Security Teams

In the 2026 landscape, autonomous agents like OpenClaw operate as high-privilege service accounts. While they boost productivity, they often bypass standard IAM policies, creating "Shadow AI" instances that can execute shell commands and move data across your network.

Claw Hunter is purpose-built for ITSec teams to detect:

  • Security Risks: Shell access, filesystem write permissions, exposed gateways
  • Credential Exposure: Scans for potential secrets and API keys
  • Integration Inventory: Active agents, channels, and registry entries
  • : Missing auth tokens, misconfigured services
Configuration Issues
  • Installation Status: CLI, config files, running processes
  • โœจ Core Capabilities

    • โœ… System Agnostic Visibility: macOS, Linux (bash 3.2+), Windows (PowerShell 5.1+)
    • โœ… MDM-Ready: Silent execution, proper exit codes, centralized logging
    • โœ… Non-Intrusive: Read-only operations, no system modifications
    • โœ… Comprehensive Detection: Installation, configuration, processes, secrets
    • โœ… Structured Output: JSON format for automation and SIEM integration
    • โœ… Zero Dependencies: Pure bash/PowerShell, optional jq for enhanced JSON

    MDM Integration

    • ๐Ÿ”’ Silent execution mode for automated deployment
    • ๐Ÿ“Š Machine identification (hostname, serial number, timestamp)
    • ๐ŸŽฏ Security risk scoring (clean, warning, critical)
    • ๐Ÿ“ค Upload results to central API endpoint
    • ๐Ÿ” Bearer token authentication support
    • ๐Ÿ“ Persistent logging to standard locations
    • โœ… Proper exit codes for automation

    Exit Codes

    • 0: No issues detected (clean)
    • 1: Security issues or warnings found
    • 2: OpenClaw not installed
    • 3: Script execution error

    ๐Ÿš€ Quick Start

    Interactive Mode (Manual Audit)

    macOS/Linux:

    # Download and run
    curl -O  https://raw.githubusercontent.com/backslash-security/Claw-Hunter/main/claw-hunter.sh
    chmod +x claw-hunter.sh
    ./claw-hunter.sh
    

    Windows:

    # Download and run
    Invoke-WebRequest -Uri  https://raw.githubusercontent.com/backslash-security/Claw-Hunter/main/claw-hunter.ps1 -OutFile claw-hunter.ps1
    .\claw-hunter.ps1
    

    MDM Deployment (Automated)

    Jamf Pro (macOS):

    sudo /path/to/claw-hunter.sh --mdm --upload-url https://your-api.com/audits --api-key-file /etc/openclaw-key
    

    Microsoft Intune (Windows):

    .\claw-hunter.ps1 --mdm --upload-url https://your-api.com/audits
    

    See MDM Deployment Guides for platform-specific instructions.

    ๐Ÿ“– Usage

    Command-Line Options

    ./claw-hunter.sh [OPTIONS]
    
    Options:
      --json                   Print JSON output to terminal (stdout)
      --json-path <file>       Save JSON results to this file path
      --mdm                    MDM mode: silent execution with JSON output
      --upload-url <url>       Upload JSON results to this URL
      --api-key-file <file>    File containing API key for authentication
      --log-file <file>        Write logs to this file
      -h, --help               Show help message
    
    MDM Mode:
      Silent execution designed for automated deployment via MDM platforms.
      - Suppresses terminal output (errors go to stderr)
      - Writes JSON to /var/log/claw-hunter.json (Unix) or C:\ProgramData\claw-hunter.json (Windows)
      - Logs to corresponding .log file
      - Returns proper exit codes for automation
    

    Examples

    # Interactive mode with terminal output
    ./claw-hunter.sh
    
    # Save results to JSON file
    ./claw-hunter.sh --json-path /tmp/audit-results.json
    
    # Print JSON to stdout
    ./claw-hunter.sh --json
    
    # MDM deployment with upload
    sudo ./claw-hunter.sh --mdm --upload-url https://api.example.com/audits --api-key-file /etc/audit-key
    
    # MDM with custom paths
    sudo ./claw-hunter.sh --mdm --json-path /custom/audit.json --log-file /var/log/custom.log
    

    ๐Ÿ“Š Output Format

    Terminal Output (Interactive Mode)

    ==========================================
    ๐Ÿ›ก๏ธ  OPENCLAW SECURITY AUDIT: UNIX/MAC (v3)
    ==========================================
    
    --- [ Detection ] ---
    โœ… State Dir: /Users/john/.openclaw
    โœ… Config: /Users/john/.openclaw/openclaw.json (found)
    โœ… CLI: /usr/local/bin/openclaw (v1.2.3)
    
    --- [ Network & Gateway ] ---
    โšก Gateway: ACTIVE (Port 18789 | PID: 12345)
    โš ๏ธ  Gateway auth token: NOT SET
    
    --- [ Privileges & Tools ] ---
    โ— RISK: Shell Access ENABLED
    โœ… Filesystem Write: not flagged
    

    JSON Output (MDM Mode)

    {
      "mdm_mode": true,
      "mdm_metadata": {
        "hostname": "LAPTOP-ABC123",
        "serial_number": "C02XYZ123456",
        "timestamp": "2026-02-02T20:30:00Z",
        "script_version": "3.0"
      },
      "security_summary": {
        "risk_level": "warning",
        "critical_issues": 1,
        "warnings": 2,
        "info_items": 5
      },
      "platform": "unix",
      "os": "macos",
      "cli_installed": true,
      "cli_version": "1.2.3",
      "gateway_running": true,
      "gateway_token_set": false,
      "risk_shell_access_enabled": true,
      "secrets_found": false
    }
    

    See examples/ for complete output samples.

    ๐Ÿ”ง Requirements

    Bash Script (macOS/Linux)

    • Bash 3.2 or higher (pre-installed on macOS/most Linux)
    • Standard Unix utilities: grep, awk, sed, find
    • Optional: jq for enhanced JSON formatting
    • Root/sudo access for MDM mode (for serial number access)

    PowerShell Script (Windows)

    • PowerShell 5.1 or higher (Windows 10/11)
    • No additional dependencies
    • Administrator privileges recommended for MDM mode

    ๐Ÿงช Testing

    Run the test suite to verify functionality:

    # Bash tests
    cd tests/bash
    ./run-tests.sh
    
    # PowerShell tests
    cd tests/powershell
    .\run-tests.ps1
    

    See tests/README.md for detailed testing documentation.

    ๐Ÿ“ License

    Distributed under the MIT License. see the LICENSE file for details.

    โš–๏ธ Legal Disclaimer

    Claw Hunter is an independent security research tool. We are not affiliated, associated, authorized, endorsed by, or in any way officially connected with OpenClaw (formerly Moltbot) or any of its subsidiaries or its affiliates. The name OpenClaw as well as related names, marks, emblems, and images are registered trademarks of their respective owners.

    โš ๏ธ Disclaimer

    This tool performs read-only security audits and does not modify system configurations. Always test in a non-production environment first. The tool detects potential security issues but does not make judgments about your specific security requirements. <br/> Security Considerations - What the audit detects and why

    ๐Ÿค Contact & Support

    For security disclosures, enterprise support, or general inquiries, please reach out to the team.

    • ๐ŸŒ Website: backslash.security

    • ๐Ÿ’Œ Email: support@backslash.security

    ๐Ÿฉท Acknowledgments

    • All the contributors making AI safer every day.

    • Maintained with โค๏ธ by the team at Backslash Security.

    • Special thanks to the security researchers documenting the evolution of autonomous agent persistence.

    • Don't forget to <strong> Vibe Safely! </strong>

      <p align="center"> <img width="300" alt="Backslash Security" src="https://github.com/user-attachments/assets/b12edb57-6d0f-4070-8c52-142bc2d671a7" /> <img width="300" alt="Backslash Security" src="https://github.com/user-attachments/assets/b12edb57-6d0f-4070-8c52-142bc2d671a7" /> </p>

    Ecosystem Role

    Standard MoltPulse indexed agent.