Settings.json: 16 scoped Bash grants (was 6 wildcards), 26-pattern deny list (was 5). CVE mapping: all 9 OpenClaw CVEs mapped to specific defenses with layer documentation. Scan results: posture Grade D (expected without llm-security), deep scan 0 critical/high. Hooks README: Option A — document llm-security hooks, recommend plugin installation. README: evidence-based security section with scan data and verification instructions. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| auto-mode-explained.md | ||
| cve-mitigation-map.md | ||
| hook-based-guardrails.md | ||
| nemoclaw-comparison.md | ||
| openclaw-security-assessment.md | ||
| permission-modes-explained.md | ||
| README.md | ||
| scan-results.md | ||
Security
This directory contains evidence that Claude Code handles the security challenges documented in OpenClaw's CVE disclosures (March 2026). Not just claims — scan data, CVE mappings, and reproducible configuration.
Documents
| File | What it covers |
|---|---|
cve-mitigation-map.md |
Each OpenClaw CVE mapped to a specific Claude Code defense |
scan-results.md |
Posture and deep scan results (reproducible, dated 2026-04-05) |
openclaw-security-assessment.md |
Data-driven 10-category comparison with CVE analysis |
permission-modes-explained.md |
The four permission modes and when to use each |
auto-mode-explained.md |
Auto Mode: AI safety classifier for autonomous execution |
hook-based-guardrails.md |
Building custom security with PreToolUse hooks |
nemoclaw-comparison.md |
Honest comparison with NemoClaw's enterprise security |
The evidence chain
-
Architecture eliminates 4 CVEs — No gateway, no ports, no multi-user auth means CVE-2026-22172, CVE-2026-25253, CVE-2026-32025, and CVE-2026-32049 cannot occur. See
cve-mitigation-map.md. -
Configuration blocks 5 CVEs — Scoped Bash permissions (16 grants, 26 deny patterns) and hook enforcement prevent the remaining attack vectors. See
.claude/settings.jsonandhooks/README.md. -
Code is clean — Deep scan (10 scanners, 51 files): zero secrets, zero injection vectors, zero supply chain risk, zero Unicode attacks. See
scan-results.md. -
The gap is documented — Posture Grade D without llm-security plugin, Grade B+ with it. The gap is runtime hook enforcement, not code or configuration quality. See
scan-results.md.
How to verify
# Clone and scan yourself:
git clone https://git.fromaitochitta.com/open/claude-code-complete-agent.git
cd claude-code-complete-agent
# With llm-security plugin installed:
/security posture # Configuration assessment
/security scan . # Code-level scan
/security deep-scan . # All 10 deterministic scanners
Honest gaps
- No kernel isolation. NemoClaw (Landlock, seccomp, netns) provides stronger containment than hooks.
- No network egress filtering. Use OS-level firewall rules.
- Single-user only. No multi-tenant separation.
See nemoclaw-comparison.md for the full honest assessment.