NullClaw provides multiple layers of security controls to safely execute agent actions. Configure sandboxing, resource limits, and autonomy policies to match your risk tolerance.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/nullclaw/nullclaw/llms.txt
Use this file to discover all available pages before exploring further.
Autonomy Level
Control how much independence the agent has:Autonomy level:
supervised— Require approval for medium/high risk actions (default)autonomous— Execute all allowed actions without approvalrestricted— Only execute explicitly allowed commands
Restrict file operations to the workspace directory (
~/.nullclaw/workspace).Maximum number of tool actions per hour (rate limit).
Require user approval for medium-risk actions (file edits, API calls).
Block high-risk commands entirely (rm -rf, sudo, etc.).
Explicit allowlist of shell commands (only used in
restricted mode).Additional directories the agent may access beyond the workspace.
Sandbox Configuration
Run shell commands in an isolated sandbox:Enable sandboxing for shell commands.
null (default) enables sandbox if a backend is available.Sandbox backend:
auto— Auto-detect best available backendlandlock— Linux Landlock LSM (kernel 5.13+)firejail— Firejail sandbox wrapperbubblewrap— Bubblewrap (bwrap) sandboxdocker— Run commands in Docker containersnone— No sandboxing (unsafe)
Additional arguments passed to Firejail (e.g.,
["--net=none", "--private"]).Sandbox Backend Comparison
| Backend | Platform | Isolation | Setup |
|---|---|---|---|
| landlock | Linux 5.13+ | Kernel-level filesystem | Built-in (no setup) |
| firejail | Linux | Namespace + seccomp | apt install firejail |
| bubblewrap | Linux | Namespace isolation | apt install bubblewrap |
| docker | Linux/macOS | Full container | Docker installed |
| none | Any | No isolation | N/A |
Resource Limits
Constrain CPU, memory, and disk usage:Maximum memory per command (MB).
Maximum CPU usage percent.
Maximum disk space for temp files (MB).
Maximum CPU time per command (seconds).
Maximum number of subprocesses.
Audit Logging
Track all agent actions:Enable audit logging.
Audit log file path (relative to
~/.nullclaw/).Keep audit logs for this many days.
Maximum audit log file size before rotation (MB).
Cryptographically sign audit events (requires key setup).
Runtime Configuration
Configure the execution environment:Runtime adapter:
native (host system), docker, wasm, or cloudflare.Docker image for containerized execution.
Docker network mode:
none (no network), bridge, or host.Memory limit for Docker containers (MB).
Mount container root filesystem as read-only.
Tool-Level Security
Configure specific tool restrictions:Timeout for shell commands (seconds).
Maximum shell output size (1 MB).
Enable browser automation tools. Disabled by default.
Allowlist of domains the browser can access (empty = all domains blocked).
Enable HTTP request tools. Disabled by default.
Allowlist of domains for HTTP requests (empty = all blocked).