Skip to content
ClawCenter Logo
ClawCenter
Security ManifestGovernance boundaries and autonomous permission boundaries.
Compliance ModeStrict Enforcement
Safety Tier
SandboxIsolated execution environment with strict boundaries.
Allows
Read-only file access
Query database operations
LLM reasoning & planning
MCP tool read operations
Blocks
Code modifications
Production deployments
Shell command execution
MCP write operations
Destructive file operations
Active Tier
AutonomousFull operational authority with guardrails and audit trail.
Allows
Code modifications & PRs
Staging deployments
Shell command execution
MCP full access
File create/modify/delete
Database read/write
Blocks
Production deployments (requires approval)
Cross-account resource access
Agent Capability Matrix
SuperClaw
Medium Risk
Capabilities
  • Read/Write Memory
  • Dispatch Tasks
  • Trigger Deployments
  • Read Traces
Linked Resources
MemoryTableAgentBusDeployerTraceTable
Coder Agent
High Risk
Capabilities
  • Write Code
  • Read Code
  • Pre-flight Validation
Linked Resources
StagingBucketLocal Filesystem
Strategic Planner
Medium Risk
Capabilities
  • Prioritize Capability Gaps
  • Draft Evolution Plans
  • Dispatch Evolution Tasks
Linked Resources
ConfigTableMemoryTableAgentBus
Cognition Reflector
Low Risk
Capabilities
  • Distill Memory
  • Extract Tactical Lessons
  • Identify Capability Gaps
Linked Resources
TraceTableMemoryTable
QA Auditor
Low Risk
Capabilities
  • Verify Task Completion
  • Analyze Execution Traces
  • Close Capability Gaps
Linked Resources
TraceTableMemoryTableAgentBus
Build Monitor
Low Risk
Capabilities
  • Read Build Logs
  • Emit Failure Events
Linked Resources
CodeBuild LogsAgentBus

Protected Resource Labeling

sst.config.tsHARD_BLOCK
Prevents resource deletionInfra
src/tools/index.tsHARD_BLOCK
Prevents tool hijackingLogic
src/lib/agent.tsHARD_BLOCK
Prevents prompt injection in coreCore
buildspec.ymlHARD_BLOCK
Prevents pipeline tamperingCI/CD
src/infra/**HARD_BLOCK
Protects AWS definitionsTopology
infra/bootstrap/**HARD_BLOCK
Critical setup protectionBootstrap

Writing to these paths requires Human-in-the-Loop (HITL) approval via Telegram. The Coder Agent cannot bypass this block.

Infrastructure Boundaries (IAM)

Permissions are hardware-enforced at the AWS IAM level. Agents only have access to the specific resources linked in sst.config.ts.

Principle of Least PrivilegeScoped Tokens