Your AI agent has your credentials. This gives it rules.
Policy, audit, kill switch for OpenClaw agents, AI work assistants, and any bot with access to your accounts.
42,000 live credentials leaked from AI agent workflows. The community's response? Buy a separate Mac Mini. declawed replaces the Mac Mini — software governance instead of hardware isolation.
You need an AnchorBrowser API key: export ANCHOR_API_KEY=your-key
npm install declawedCreate shield.yaml:
agent: my-openclaw-sales-bot
rules:
allow:
- "read*"
- "list*"
- "check*"
- "search*"
deny:
- "*send*"
- "*delete*"
- "*export*"
- "*password*"
default: deny
expire_after: 60min
max_actions: 50import { createShield } from 'declawed'
const shield = createShield('./shield.yaml')
const result = await shield.task('check linkedin inbox')
// → { allowed: true, output: '...' }
const result2 = await shield.task('export all contacts to CSV')
// → { allowed: false, reason: 'blocked by deny pattern: *export*' }That's it. Every shield.task() call is policy-checked, audited, and budgeted.
Your credentials live in AnchorBrowser, not in your code. Your agent never sees your password — it gets a scoped, ephemeral session, and declawed controls what it can do.
Three layers of protection:
- Credential isolation — your password stays in AnchorBrowser. The agent gets a pre-authenticated session, never the credentials themselves.
- Scoped permissions — the agent can only do what your policy allows. Read inbox? Yes. Delete contacts? Blocked. It can't go beyond the scope you define.
- Audit + kill switch — every action logged (allowed and blocked). Budget enforced. Instant session destruction when you're done.
flowchart TD
A["🔑 <b>One-time setup</b><br/>Create AnchorBrowser profile<br/>Log into LinkedIn / Gmail manually<br/>Auth saved — password never leaves AnchorBrowser"] --> D
D["🤖 Agent calls <b>shield.task</b>"] --> E{"🛡️ <b>declawed</b><br/>Policy check"}
E -->|"✅ Allowed"| F["☁️ <b>AnchorBrowser</b><br/>Ephemeral cloud session<br/>with your saved profile<br/>Already logged in"]
E -->|"❌ Blocked"| G["🚫 <b>Stopped</b><br/>Agent never reaches<br/>your account"]
F --> H["Task executes in<br/>isolated cloud browser"]
H --> I["Result returned to agent"]
G --> J["📝 Every action logged"]
I --> J
J --> K["⏱️ Budget enforced<br/>🔴 Kill switch ready"]
style A fill:#1565c0,color:#fff
style E fill:#f57f17,color:#fff
style F fill:#388e3c,color:#fff
style G fill:#d32f2f,color:#fff
npx declawed status # Agent: my-openclaw-sales-bot | Allowed: 23 | Blocked: 3
npx declawed audit # Full audit trail
npx declawed kill # Kill switch — destroy session immediatelyFull API reference & policy examples →
declawed runs on AnchorBrowser — ephemeral, hardened cloud browser sessions purpose-built for AI agents. Each session is isolated, auto-expires, and leaves no trace. Cloudflare verified bot partner. SOC2 Type 2 and ISO27001 certified. Trusted by Google, Coinbase, and Composio. Stealth proxies, CAPTCHA solving, anti-fingerprinting, and full session isolation out of the box.
AnchorBrowser handles the browser. declawed handles the rules.
AI agents are getting credential access with zero governance — 42,000 live credentials exposed, and the best workaround is buying separate hardware. declawed gives agents what they should have had from the start: a policy file, an audit log, and a kill switch.
Built by Behalf — delegation governance for the agent era.
MIT

