UStackUStack
IronClaw favicon

IronClaw

IronClaw is the open-source, secure runtime that runs AI agents in encrypted enclaves on NEAR AI Cloud, ensuring user secrets are never exposed to the underlying LLM.

IronClaw

What is IronClaw?

What is IronClaw?

IronClaw is the essential security layer for deploying powerful AI agents, designed as a secure, open-source alternative to standard OpenClaw deployments. Its core mission is to allow AI agents to perform complex tasks—browsing, coding, automation—without ever exposing sensitive credentials, API keys, or proprietary data to the Large Language Model (LLM) itself. By leveraging cryptographically secure infrastructure provided by NEAR AI Cloud, IronClaw isolates secrets within a Trusted Execution Environment (TEE), fundamentally solving the critical security vulnerability present in traditional agent setups where prompt injection can lead to catastrophic data leaks.

Built entirely in Rust, IronClaw offers defense-in-depth security features that eliminate entire classes of common software exploits, such as buffer overflows, due to its memory safety guarantees enforced at compile time. This robust foundation ensures that whether you are running a personal AI assistant or a complex automation workflow, your operational integrity and data privacy are maintained, giving developers and enterprises the peace of mind needed to unleash true agentic capabilities.

Key Features

  • Encrypted Enclaves (TEE): Instances run inside a Trusted Execution Environment on NEAR AI Cloud, meaning data is encrypted in memory from boot to shutdown, invisible even to the cloud provider.
  • Encrypted Vault: Credentials (API keys, tokens) are stored in an encrypted vault. They are only injected into requests at the host boundary for explicitly approved endpoints, ensuring the AI model never sees the raw secrets.
  • Built in Rust: Utilizes Rust's memory safety guarantees, eliminating common vulnerabilities like garbage collector issues, buffer overflows, and use-after-free errors.
  • Sandboxed Tools & Wasm Containers: Every tool or skill runs in an isolated WebAssembly (Wasm) container with capability-based permissions, strict resource limits, and network allowlisting.
  • Real-time Leak Detection: All outbound traffic is actively scanned. Any data attempting to exfiltrate credentials is automatically blocked before leaving the secure boundary.
  • Network Allowlisting: Users maintain granular control, pre-approving every external endpoint an agent is permitted to communicate with, preventing unauthorized data exfiltration.
  • Open-Source & Transparent: Being open-source allows for full community auditing and transparency regarding security mechanisms.

How to Use IronClaw

Getting started with IronClaw is streamlined for rapid, secure deployment, especially when utilizing the NEAR AI Cloud platform:

  1. One-Click Cloud Deployment: Launch your IronClaw instance directly on NEAR AI Cloud. This automatically boots the agent inside a pre-configured Trusted Execution Environment (TEE).
  2. Secure Credential Storage: Add all necessary API keys, tokens, and passwords to IronClaw's encrypted vault. These secrets are sealed and inaccessible to the running LLM.
  3. Define Network Access: Configure the network allowlist, specifying precisely which external URLs the agent is permitted to interact with for its tasks (e.g., specific documentation APIs or internal services).
  4. Agent Operation: Deploy and run your agent as usual (browsing, coding, automation). IronClaw intercepts external requests, injects the necessary credentials only if the destination is allowlisted, and scans all outbound traffic for potential leaks.
  5. Local Execution (Optional): For development or specific use cases, IronClaw can also be run locally, maintaining the core security model.

Use Cases

  1. Secure Financial Automation: Deploying agents that interact with sensitive financial APIs (e.g., trading platforms, banking reconciliation tools) where API keys must remain absolutely hidden from the generative model processing the data.
  2. Proprietary Code Development & Review: Using an AI agent to assist in writing or debugging internal codebase, ensuring that proprietary source code snippets or internal repository credentials used for fetching dependencies are never leaked to external LLM providers.
  3. Sensitive Data Research & Summarization: Running agents that process confidential internal documents or customer data. IronClaw ensures that even if the agent is tricked into summarizing data, it cannot exfiltrate the underlying secrets or access unauthorized external endpoints.
  4. Enterprise Workflow Orchestration: Building agents that manage complex, multi-step business processes involving access to multiple SaaS platforms. The network allowlisting feature guarantees that the agent only communicates with approved, vetted business tools.
  5. Vulnerability Testing: Developers can safely test the limits of their agentic workflows, knowing that even if a prompt injection attack succeeds in forcing the agent to attempt a data dump, the TEE and leak detection mechanisms will block the exfiltration of secrets.

FAQ

Q: How is IronClaw different from running OpenClaw locally? A: While running OpenClaw locally might seem safer, IronClaw provides a hardened, cryptographically verifiable environment via TEEs on NEAR AI Cloud. Locally, you rely entirely on your host machine's security. IronClaw guarantees memory encryption and runtime integrity regardless of the underlying cloud infrastructure.

Q: Can the LLM provider or the cloud provider see my secrets? A: No. IronClaw utilizes a Trusted Execution Environment (TEE) which encrypts memory contents. The secrets reside in the sealed vault and are only decrypted and injected at the network boundary for approved outbound calls, making them invisible to the LLM runtime and the cloud provider.

Q: What happens if a malicious skill tries to access an unapproved website? A: The request will be blocked. IronClaw enforces strict Network Allowlisting. If a tool attempts to initiate a connection to an endpoint not explicitly listed in your configuration, the connection is denied by the security runtime.

Q: Is IronClaw compatible with all existing OpenClaw tools? A: Yes. IronClaw is designed as a secure drop-in replacement for OpenClaw functionality. It maintains the same capabilities for browsing, coding, and automation, but wraps them in a secure execution context.

Q: Since it's built in Rust, does this mean I need to rewrite my agent logic? A: No. The security framework (IronClaw) runs the agent logic. You can continue developing your agent skills and tools, often using familiar languages compatible with Wasm sandboxing, while IronClaw handles the secure execution environment and secret management.

IronClaw | UStack