Safety & Guardrails¶
SuperClaw is for authorized security testing only. Do not use it against systems you do not own or explicitly have permission to test.
Required Practices¶
- Authorization: Only test systems with written permission.
- Containment: Run tests in sandboxed/isolated environments (containers/VMs).
- Validation: Treat automated findings as signals and verify manually.
Built-in Guardrails¶
SuperClaw enforces two runtime guardrails by default:
- Local-only mode
Remote targets are blocked unless you explicitly allow them.
2. Authorization Token¶
For any target that is not localhost or 127.0.0.1, SuperClaw requires an authorization token.
Important: SuperClaw does not create, manage, or validate the lifecycle of these tokens. The
SUPERCLAW_AUTH_TOKENis simply a credential pass-through. You are responsible for obtaining valid credentials from the administrator of the target system you are authorized to test.
# Set the token in your environment
export SUPERCLAW_AUTH_TOKEN="your-token"
# Run the attack
superclaw attack openclaw --target ws://remote-server:18789
Configure Guardrails¶
In ~/.superclaw/config.yaml:
Set a token for remote testing:
False Positives¶
Scenario generation can produce plausible but unrealistic exploits. Always: - Review evidence and context - Reproduce critical findings manually - Avoid over-reporting unverified results