what tools is your openclaw agent using?

2026-02-15

I installed OpenClaw and pointed it at my project directory. Within minutes it had read my .env file.

Fair enough — I gave it file access. So I installed a permissions skill to lock things down.

The agent ignored it.

Not maliciously. The skill was just a suggestion to the LLM, not an enforcement layer. There’s nothing in OpenClaw’s architecture that forces the agent to check every skill and permission before calling a tool. It’s all voluntary compliance.

So I built GatewayStack Governance — a plugin that hooks into every tool call at the process level. The agent doesn’t get to decide whether governance applies. It always does.

Five checks run on every invocation:

This isn’t theoretical. Snyk audited ClawHub and found 12% of published skills were compromised — including one campaign that delivered macOS malware through markdown instructions.

“Trust the LLM to do the right thing” is not a security model.

GatewayStack Governance is.

Open source. MIT licensed. One command install.

Peace of mind.

see it in action

in the demo: a read succeeds (agent has permission), but write and exec are blocked — the agent’s role doesn’t have access. the governance layer explains why, and every decision hits the audit log.

get started

open source, MIT licensed. install in one command:

openclaw plugins install @gatewaystack/gatewaystack-governance

zero config. governance is active on every tool call immediately.

github repo · npm package · clawhub page


interested in working together? let's talk

← back to writing