You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add hook surfaces needed for trust-aware security/provenance plugins (identity context, loop observability, LLM/tool/response interception, and session-memory controls).
Problem to solve
Security/provenance plugins need intervention points, not just observation. Today it’s hard (or impossible) for a plugin to reliably:
determine who triggered a run (owner vs non-owner, group vs DM, provenance chain) in a consistent hook context
observe iteration/loop behavior for guardrails and debugging
filter/block tool calls based on trust/taint policies as a batch after the LLM responds
redact/block the final response/tools before used or emitted and persisted
prevent/quarantine/redact session-memory persistence for sensitive conversations
Without these, policy plugins either can’t enforce controls or must rely on brittle workarounds.
Proposed solution
A small series of additive PRs that expand the hook surface and session-memory policy controls while keeping each change reviewable and low-risk. Exact event/result shapes and detailed semantics live in the PRs; this issue is intended to provide the motive and rationale behind developed, proposed solutions to these problems.
Bake security/provenance into core instead of as a plug-in: heavier architectural commitment; less flexible than providing hook primitives; genuinely believe in plugin power as an alternative to a massive openclaw core
Rely only on existing void hooks (llm_input/llm_output) + before_tool_call: still missing early LLM input filtering, batch tool-call gating, and response emission gating.
My belief at the moment is that something of this shape is necessary for the kind of plugin that can address prompt injection risks in a deterministic way.
Impact
Enables a new class of security/provenance plugins to implement trust-aware controls without invasive core changes.
openclaw-provenance: demonstrates trust/taint tracking that can dynamically gate tooling during an agent run (e.g. content fetched from an untrusted URL taints context and blocks subsequent exec). Screenshot below shows a live example while building a PhaserJS OpenClaw dashboard,
Summary
Add hook surfaces needed for trust-aware security/provenance plugins (identity context, loop observability, LLM/tool/response interception, and session-memory controls).
Problem to solve
Security/provenance plugins need intervention points, not just observation. Today it’s hard (or impossible) for a plugin to reliably:
Without these, policy plugins either can’t enforce controls or must rely on brittle workarounds.
Proposed solution
A small series of additive PRs that expand the hook surface and session-memory policy controls while keeping each change reviewable and low-risk. Exact event/result shapes and detailed semantics live in the PRs; this issue is intended to provide the motive and rationale behind developed, proposed solutions to these problems.
Proposed merge order:
Alternatives considered
My belief at the moment is that something of this shape is necessary for the kind of plugin that can address prompt injection risks in a deterministic way.
Impact
Evidence/examples
Additional information
In local production for ~1mo. Developer working with well-groomed agents.