RTR OpenClaw — Skill Security Gateway sɣur CSOS
Three-layer agentic skill security: SkillAnalyzer (pre-execution), RuntimeGuard (runtime enforcement), PromptShield (injection detection). Plant-level H-C-E collapse gating under RTR Governance Protocol v1.1.
ArmitanArmitan
Yella ɣef Firefox i Android™Yella ɣef Firefox i Android™
23 yiseqdacen23 yiseqdacen
Asiɣzef aɣefisefka
Ɣef usiɣzef agi
RTR OpenClaw enforces a three-layer security model before and during AI skill execution in the browser.
SkillAnalyzer runs a four-pass heuristic inspection of skill code before execution — checking for network exfiltration (SA-G1), filesystem access (SA-G2), dynamic code execution (SA-G3), credential leakage (SA-G4), and aggregate behavioural penalty scoring (SA-G5). Skills with critical violations are rejected before they can run.
RuntimeGuard monitors active skill sessions using Firefox's blocking webRequest API. It enforces per-session request limits, cancels policy-violating requests, and triggers a kill switch when the H–C–E collapse gate fails — transitioning the skill to a locked state.
PromptShield intercepts WebSocket frames for eight classes of prompt injection (PI-001–PI-008), including role hijacking, encoding evasion, delimiter injection, and exfiltration attempts. Only hashes and match metadata are stored — no raw message content is retained.
All three layers feed into a signed Proof Bundle: a cryptographically attested evidence package with H–C–E trust observables, lifecycle state, and measurement attribution, governed under RTR Governance Protocol v1.1.
SkillAnalyzer runs a four-pass heuristic inspection of skill code before execution — checking for network exfiltration (SA-G1), filesystem access (SA-G2), dynamic code execution (SA-G3), credential leakage (SA-G4), and aggregate behavioural penalty scoring (SA-G5). Skills with critical violations are rejected before they can run.
RuntimeGuard monitors active skill sessions using Firefox's blocking webRequest API. It enforces per-session request limits, cancels policy-violating requests, and triggers a kill switch when the H–C–E collapse gate fails — transitioning the skill to a locked state.
PromptShield intercepts WebSocket frames for eight classes of prompt injection (PI-001–PI-008), including role hijacking, encoding evasion, delimiter injection, and exfiltration attempts. Only hashes and match metadata are stored — no raw message content is retained.
All three layers feed into a signed Proof Bundle: a cryptographically attested evidence package with H–C–E trust observables, lifecycle state, and measurement attribution, governed under RTR Governance Protocol v1.1.
Rated 0 by 0 reviewers
Tisirag akked yisefka
Yesra tisirag:
- Ad k-d-isken ilɣa
- Kcem γer icarren n iminig
- Kcem ɣer isefka-inek deg ismal web meṛṛa
Alqaḍ n yisefka:
- Aneflay yenna-d asiɣzef-a ur yeḥwaǧ ara alqaḍ n yisefka.
Ugar n telɣut
- Lqem
- 0.2.0
- Teɣzi
- 87,69 KB
- Aleqqem aneggaru
- prije mjesec (5. ožu. 2026)
- Taggayin i ilan assaɣ
- Turagt
- Apache License 2.0
- Tasertit n tbaḍnit
- Ɣeṛ tasertit n tbaḍnit i uzegrir-agi
- Amazray n Lqem
- Rnu ar tegrumma