Skip to content
Home AI Security Tools Cisco DefenseClaw
Cisco DefenseClaw

Cisco DefenseClaw

NEW
Category: AI Security
License: Free (Open-Source)
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated April 3, 2026
5 min read
Key Takeaways
  • Enterprise governance layer that enforces a strict principle: nothing runs until it is scanned, and anything dangerous is blocked automatically.
  • Four integrated scanners: Skill Scanner for AI agent skills, MCP Scanner for MCP servers, CodeGuard for static code analysis, and AI Bill of Materials (AIBOM) for component inventory.
  • Three-tier architecture — Python CLI, Go gateway (policy enforcement + audit logging), and TypeScript plugin — with sandbox isolation using Landlock LSM and seccomp-BPF.
  • Released at RSA 2026 by Cisco AI Defense. Integrates with Splunk HEC and OTLP collectors for enterprise observability.

Cisco DefenseClaw is an open-source security governance framework for agentic AI systems that enforces a strict principle: nothing runs until it has been scanned, and anything dangerous is blocked automatically. While MCP-Scan focuses specifically on MCP server vulnerability scanning, DefenseClaw provides a broader governance layer that adds skill scanning, static code analysis, runtime inspection, and sandbox isolation.

Released at RSA 2026 by Cisco AI Defense, DefenseClaw provides pre-execution scanning of AI agent skills and MCP servers, static code analysis, runtime inspection of LLM interactions, and enterprise-grade audit logging. The framework serves as a governance layer for OpenClaw, an open-source AI agent framework, but its scanning components work independently.

The project is part of Cisco’s broader AI Defense portfolio, which addresses security across the AI application lifecycle from development through deployment.

What is Cisco DefenseClaw?

As AI agents gain the ability to execute code, call external APIs, and interact with production systems, the attack surface expands dramatically. A compromised agent skill can exfiltrate data, a poisoned MCP server can hijack agent behavior, and insecure code patterns can introduce vulnerabilities that traditional security tools miss.

DefenseClaw addresses this by inserting a mandatory security gate between AI components and execution. Every skill, MCP server, and code artifact is scanned before it runs. Runtime interactions between agents and LLMs are inspected for secrets, PII, and injection patterns. All decisions are logged to an immutable audit store.

Component Scanning
Skill Scanner analyzes AI agent skills before execution. MCP Scanner inspects MCP servers for vulnerabilities. AI Bill of Materials (AIBOM) generates a unified component inventory with severity-ranked findings across all scanned components.
CodeGuard Static Analysis
Detects hardcoded credentials, dangerous code execution patterns (eval, subprocess with shell=True), unsafe deserialization, SQL injection, weak cryptography, and path traversal. Purpose-built for the patterns that appear in AI agent code.
Runtime Inspection
Message Inspection examines LLM prompts and completions for secrets, PII, and injection patterns. Tool Inspection evaluates six threat categories: secrets, commands, sensitive paths, C2 hostnames, cognitive file tampering, and prompt injection disguises.

Key Features

FeatureDetails
Skill ScannerPre-execution analysis of AI agent skills
MCP ScannerVulnerability scanning for MCP servers
AIBOMAI Bill of Materials with severity-ranked findings
CodeGuardStatic analysis for credentials, injection, unsafe patterns
Message InspectionPrompt/completion scanning for secrets, PII, injection
Tool InspectionSix categories: secrets, commands, paths, C2, tampering, injection
Sandbox ModeOS-level isolation with Landlock LSM and seccomp-BPF
Policy EnforcementGo gateway with REST API and WebSocket bridging
Audit LoggingSQLite store with full decision history
SIEM IntegrationSplunk HEC real-time event forwarding
ObservabilityOTLP export (logs, spans, metrics) to Jaeger, Grafana, Datadog
Build Systemmake build (all), make pycli, make gateway, make plugin
Cross-compilemake gateway-cross GOOS=linux GOARCH=arm64 (DGX Spark)
RequirementsPython 3.10+, Go 1.25+, Node.js 20+ (plugin only)
LicenseApache 2.0

Three-tier architecture

DefenseClaw consists of three integrated components working together:

The Python CLI is the operator-facing tool for scanning and policy management. Security teams use it to run Skill Scanner, MCP Scanner, and CodeGuard against their AI components.

The Go Gateway is the central daemon that handles REST API requests, WebSocket bridging, policy enforcement, and audit logging. Every security decision flows through the gateway, which writes to a SQLite audit store and can forward events to Splunk HEC or OTLP-compatible collectors in real time.

The TypeScript Plugin runs inside the OpenClaw agent framework, intercepting tool calls via hooks. When an agent attempts to use a tool, the plugin routes the request through the gateway for policy evaluation before allowing execution.

Sandbox isolation

For high-risk operations, DefenseClaw provides OS-level sandboxing using Landlock LSM (Linux Security Module) for filesystem access control and seccomp-BPF for system call filtering. This creates a restricted execution environment where agent skills can only access explicitly permitted resources — even if the skill itself is compromised.

Enterprise observability

All security decisions flow through the Go gateway and are written to a SQLite audit store. For enterprise environments, DefenseClaw can forward events to Splunk HEC in real time for SIEM integration, or export logs, spans, and metrics via OTLP to collectors like Jaeger, Grafana, or Datadog. This means every scan result, runtime inspection outcome, and policy enforcement decision is captured in your existing observability stack.

LLM guardrail proxy

DefenseClaw includes a built-in guardrail proxy that inspects all LLM traffic in real time, operating independently of plugin installation. The proxy runs in two modes: observe mode logs findings without blocking, while action mode actively blocks flagged prompts and responses. Severity thresholds are configurable in ~/.defenseclaw/config.yaml.

Tool inspection categories

The runtime tool inspection engine evaluates six specific threat categories: secret (API keys in arguments), command (shell commands like curl/wget/nc), sensitive-path (system files), c2 (command-and-control hostnames), cognitive-file (memory/instruction tampering), and trust-exploit (prompt injection disguised as arguments).

Getting Started

1
Install DefenseClaw — Run the one-line installer: curl -LsSf https://raw.githubusercontent.com/cisco-ai-defense/defenseclaw/main/scripts/install.sh | bash. Requires Python 3.10+, Go 1.25+, and optionally Node.js 20+ for the TypeScript plugin.
2
Initialize the framework — Run defenseclaw init --enable-guardrail to set up the Go gateway, configure the SQLite audit store, and enable guardrail functionality. The gateway starts listening for policy enforcement requests.
3
Scan your AI components — Use the CLI to run Skill Scanner on your agent skills, MCP Scanner on your MCP servers, and CodeGuard on your codebase. The AIBOM generator creates a unified inventory with severity-ranked findings.
4
Configure runtime inspection — Enable Message Inspection and Tool Inspection to scan LLM interactions in real time. Define policies for what should be blocked, alerted, or logged for each threat category.
5
Connect enterprise observability — Forward audit events to Splunk HEC for SIEM integration or export logs, spans, and metrics via OTLP to your existing observability stack (Jaeger, Grafana, Datadog). Set OTEL_EXPORTER_OTLP_ENDPOINT for OTLP collectors.

When to use Cisco DefenseClaw

Ideal for organizations deploying agentic AI systems in enterprise environments that need governance controls matching their existing security standards. The framework covers the full lifecycle — pre-execution scanning, runtime inspection, and audit logging — which makes it a strong fit for regulated industries where every AI component interaction needs to be auditable.

The Cisco backing and enterprise integrations (Splunk, OTLP) make it a natural fit for organizations already in the Cisco security ecosystem, though the open-source license means it works independently of any Cisco product.

Best for
Enterprise security teams deploying agentic AI systems that need full lifecycle governance — pre-execution scanning, runtime inspection, sandbox isolation, and auditable logging — especially in regulated environments or Cisco security ecosystems.

For a broader overview of AI security tools, see the AI security tools guide. For MCP-specific vulnerability scanning without the full governance framework, see MCP-Scan. For security analysis of agentic workflows across multiple frameworks, consider Agentic Radar.

Frequently Asked Questions

What is Cisco DefenseClaw?
Cisco DefenseClaw is an open-source security governance framework for agentic AI systems. Built by Cisco AI Defense and released at RSA 2026, it scans AI agent skills and MCP servers for vulnerabilities, performs static code analysis, generates AI Bills of Materials, and enforces security policies at runtime — all before any agent component is allowed to execute.
Is Cisco DefenseClaw free?
Yes, DefenseClaw is free and open-source under the Apache 2.0 license. It is developed by Cisco AI Defense as part of their enterprise AI security offering.
How does DefenseClaw compare to MCP-Scan?
MCP-Scan focuses specifically on scanning MCP server configurations for prompt injection and tool poisoning. DefenseClaw is a broader governance framework that includes MCP scanning but also adds Skill Scanner for AI agent skills, CodeGuard for static code analysis, runtime message and tool inspection, sandbox isolation, and enterprise integrations (Splunk, OTLP). DefenseClaw is more suited for organizations that need full lifecycle governance of agentic AI deployments.