A CLI tool that validates OpenClaw workspace integrity and blocks .env injection, config poisoning, and prompt injection before the agent boots
OpenClaw loads .env files from the current working directory before its trusted configuration, and trusts heartbeat context inheritance without proper validation. CVE-2026-41294 (CVSS 8.6) and CVE-2026-41329 (CVSS 9.9) exploit these pre-boot trust assumptions. With 138+ CVEs tracked in 63 days and 397-point HN posts calling the platform a security nightmare, operators need a pre-boot safety gate that catches workspace-level attacks before the agent gets any execution context.
Demand Breakdown
Social Proof 4 sources
Gap Assessment
3 tools exist (openclaw doctor, ClawSec, NanoClaw) but gaps remain: Reactive only. Does not scan workspace for injection attacks or block startup on findings. Runs after the agent already loaded potentially malicious .env files.; Operates at runtime after the agent is executing. No pre-boot workspace scanning. Does not detect .env injection or heartbeat context manipulation..
Features5 agent-ready prompts
Competitive LandscapeFREE
| Product | Does | Missing |
|---|---|---|
| openclaw doctor | Built-in diagnostic checking gateway health and config validity after startup | Reactive only. Does not scan workspace for injection attacks or block startup on findings. Runs after the agent already loaded potentially malicious .env files. |
| ClawSec | Runtime security skill suite with drift detection, audit logs, and skill integrity verification | Operates at runtime after the agent is executing. No pre-boot workspace scanning. Does not detect .env injection or heartbeat context manipulation. |
| NanoClaw | Docker container isolation for OpenClaw with sandboxed execution environment | Isolates the runtime but does not validate workspace contents before boot. A malicious .env inside the container still triggers CVE-2026-41294. |
Sign in to unlock full access.