1
0
Fork 0
claude-code-complete-agent/security
Kjell Tore Guttormsen 2fe6a78e3c docs(security): add OpenClaw vs Claude Code security assessment
Data-driven comparison covering 9 CVEs, 10 security categories,
and attack surface analysis. Based on published research from
SecurityScorecard, DigitalOcean, Sangfor, and OpenClaw official docs.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-04-05 23:38:34 +02:00
..
auto-mode-explained.md feat: add Computer Use, Remote Control, Auto Mode, and Cowork integration 2026-03-26 10:04:05 +01:00
hook-based-guardrails.md feat: initial companion repo for OpenClaw vs Claude Code article 2026-03-26 09:47:29 +01:00
nemoclaw-comparison.md feat: initial companion repo for OpenClaw vs Claude Code article 2026-03-26 09:47:29 +01:00
openclaw-security-assessment.md docs(security): add OpenClaw vs Claude Code security assessment 2026-04-05 23:38:34 +02:00
permission-modes-explained.md feat: add Computer Use, Remote Control, Auto Mode, and Cowork integration 2026-03-26 10:04:05 +01:00
README.md docs(security): add OpenClaw vs Claude Code security assessment 2026-04-05 23:38:34 +02:00

Security

Security in Claude Code is layered: permission modes set the baseline, hooks enforce custom rules, and settings.json defines tool restrictions. This is architecturally different from OpenClaw's container-based isolation but achieves the same goal: controlled agent behavior.

Documents in this directory

File What it covers
permission-modes-explained.md The four permission modes and when to use each
auto-mode-explained.md Auto Mode: AI safety classifier for autonomous execution
hook-based-guardrails.md Building custom security with PreToolUse hooks
nemoclaw-comparison.md Honest comparison with NemoClaw's enterprise security
openclaw-security-assessment.md Data-driven security comparison: OpenClaw CVEs vs Claude Code architecture