ButterClaw v0.1 is Live

Traditional security stops at the door.
We watch the room.

The world's first fully local, zero-temperature Agentic SOC. Defend your AI infrastructure against Cross-Site WebSocket Hijacking and Indirect Prompt Injections with deterministic, behavioral logic gates.

ButterClaw Logic Gate

The Decoupled Architecture

A 100% local, reactive pipeline designed to intercept and analyze OS-level telemetry in milliseconds.

Node 01

The Watcher

watcher.py

Asynchronous Python monitor. Ingests live gateway logs, ignores ghost lines, and dispatches HTTP payloads the millisecond a threat is written.

Node 02

The API

server.py

Flask middleware routing server. Manages CORS preflight handshakes and locks telemetry into a persistent, embedded SQLite vault.

Node 03

The Brain

ollama run phi3

A localized 3.8B parameter model. Mathematically frozen (temp: 0.0) to act as a strict logic gate, guaranteeing deterministic security verdicts.

Node 04

The UI

index.html

Vanilla JS and Tailwind dashboard. Utilizes a zero-polling Server-Sent Events (SSE) pipeline for instantaneous, auto-healing DOM updates.

Defense in Depth:
The "Judge LLM" Paradigm

In an enterprise environment, network perimeters and system prompts are critical vulnerabilities. While standard guardrails prevent an AI from outputting malicious content, they often fail to monitor what the AI is reading or doing in the background.

  • 🛡️ Beyond mTLS: Authenticated agents can still be compromised via Indirect Prompt Injections hidden in legitimate payloads.
  • ⚖️ LLM-in-the-Middle: ButterClaw uses a highly-specialized local model to constantly supervise the telemetry of larger, workflow-oriented agents.
openclaw_gateway.log — Live Fire Simulation
# 1. Inject malicious payload into the gateway log...
192.168.1.45 - - [14/Mar/2026:17:35:17 -0700] "GET /api/v1/extract_arc_raiders_token HTTP/1.1" 401 -
# 2. Watcher detects change. Forwarding to Brain...
# 3. Phi-3 Zero-Temp Analysis in progress (~12s)...
# 4. SSE Pipeline triggered. Verdict generated:
VERDICT: CRITICAL The log indicates a targeted attempt to extract sensitive Arc Raiders game tokens via an unauthorized endpoint.

Action: SIGKILL | Keys Buttered