CLAWPOLICY
Policy Control
Centralize rulepacks, thresholds, exceptions, and policy versions so each repo does not reinvent its own security logic.
- Policy profiles
- Versioned rulepacks
- Allowlist and exceptions
CLAWPLANE
ClawPlane combines ClawPolicy, ClawScan, and ClawGate into one product surface: the same policy, the same evidence, and the same gate result across Agent release workflows.
PRODUCT SURFACES
ClawPlane is not another loose collection of scanner scripts. It is a product layer for policy, scanning, gating, and trust proof.
CLAWPOLICY
Centralize rulepacks, thresholds, exceptions, and policy versions so each repo does not reinvent its own security logic.
CLAWSCAN
Scan repos, skills, MCP servers, and exposed endpoints with evidence-rich output and scanner/rulepack lineage.
CLAWGATE
Apply blocking decisions to PR, CI, and deploy workflows before risky Agent changes ship.
WORKFLOW
Your engineering flow connects once. Scanning, diffing, blocking, and public proof then run through the same model.
Connect GitHub repos, artifacts, skills, or public endpoints into one scan job pipeline.
Run scans against versioned rulepacks and policy profiles with traceable lineage on every job.
Use ClawGate to block only new or high-risk findings before merge or deploy.
Sync reports, watchboards, and audit exports into one public or internal view.
WHY THIS PRODUCT
A standalone scanner only tells you that something is wrong. ClawPlane answers who blocks, when to block, how to verify again, and how to present evidence externally.
PUBLIC PROOF
ClawScan results are no longer isolated reports. They become searchable, filterable, shareable security surfaces.
Open the openclaw.aipwn.org view →ARCHITECTURE
ClawPlane does not replace your engineering systems. It sits between submission, scan, gate, and proof.
USE CASES
Standardize the Agent release path once instead of rebuilding security flow in every business line.
Track which repos, endpoints, and skill packs keep generating high-risk findings and prioritize newly introduced risk.
Insert scanning, gating, and trust proof into an existing engineering workflow without adding a heavyweight platform.
API + CONTROL PLANE
Public entrypoints stay small: submit a job and evaluate a gate. Internally, lineage, reports, and aggregates remain available to the control plane and watchboard.
curl -X POST https://clawplane.aipwn.org/v1/scan-jobs \
-H 'Content-Type: application/json' \
-d '{
"source_type": "repo",
"source_ref": "https://github.com/org/repo",
"policy_profile": "default",
"fail_on": "high"
}'curl -X POST https://clawplane.aipwn.org/v1/gates/evaluate \
-H 'Content-Type: application/json' \
-d '{
"job_id": "job_01JY...",
"fail_on": "high"
}'{
"job_id": "job_01JY...",
"decision": "blocked",
"severity": "high",
"counts": {
"high": 3,
"medium": 7,
"low": 2
},
"lineage": {
"scanner_version": "0.2.0-alpha",
"policy_version": "default@2026.03",
"rulepack_version": "builtin@2026.03"
}
}PRICING DIRECTION
Early pricing should validate control-plane value: gating, policy, public proof, and team collaboration.
Starter
For a single repo or public research workflow that needs an initial scan loop.
Pro
For product teams already wiring Agents into PR and CI workflows.
Team
For platform and security teams rolling out one control plane together.
FAQ
ClawScan is the scan engine. ClawPlane is the product layer that unifies policy, scan, gate, watchboard, and lineage.
No. OpenClaw is the first public watchboard surface. The same model applies to repos, skills, MCP servers, and exposed endpoints.
Because public result pages create external trust proof and let teams monitor risk changes over time instead of burying a single report.
The first alpha includes scan jobs, gate evaluate, baseline/diff, the OpenClaw watchboard, and GitHub Action level integration.
EARLY ACCESS
Best for teams already shipping Agents, scanning repos, checking MCP/skill supply chains, or publishing security status externally.