
SecureMind
Blocks security leaks & data exposure in OpenClaw agents
8 followers
Blocks security leaks & data exposure in OpenClaw agents
8 followers
SecureMind v3 adds persistent agent memory and binary distribution to the defense-in-depth security layer for OpenClaw agents.
v1 blocked sensitive files and dangerous commands. v2 added PromptGuard, a 3-layer prompt intent engine. v3 ships Obsidian Memory Map — on-device persistent memory so agents remember context across sessions, plus a single-file binary plugin (no Python needed), machine-bound 10-day trial, and hardened prompt injection detection.
Nothing leaves your machine. Zero config.



🚀 Update: SecureMind v2 is live — with PromptGuard
When we built v1, we focused on blocking dangerous actions at execution time (files, commands, DLP checks).
But we realized something important:
👉 By the time a tool is called, the intent is already compromised.
So in v2, we added PromptGuard — a 3-layer intent analysis system that runs before any tool executes:
Layer 0: Fast regex detection (<50ms)
Layer 1: Rule-based classifier (understands intent vs context)
Layer 2: Optional local LLM (Ollama) for ambiguous cases
This lets us catch:
Prompt injection attempts
Credential harvesting
.env / system file exfiltration
Encoding-based evasion (base64, etc.)
Now combined with v1’s tool-level enforcement → full defense-in-depth for AI agents
Would love feedback from anyone building with OpenClaw / agents 🙌
What's new in v3:
01 — Agent Memory
AI agents forget everything between sessions. We ship an Obsidian vault that OpenClaw reads at startup. MEMORY.md holds long-term facts. Daily logs capture session history. Second-brain folders organize projects and people. Graph View visualizes connections. All on-device.
02 — Binary Distribution
v1/v2 required Python. v3 compiles everything into one binary via PyInstaller. No dependencies, no source code shipped. SHA256 integrity checks at startup — tampered files = plugin refuses to load.
03 — Machine-Bound Trial
10-day trial tied to your hardware via HMAC-SHA256. Can't be copied or tamper-extended.
04 — Prompt Injection Hardening
New patterns for system prompt extraction, instruction override, and encoding evasion (base64/ROT13 + credential terms). 444 tests total.