Zero Trust File Access
Give your AI agent scoped, time-limited, audited access - without exposing your filesystem.
Assume the agent machine is compromised.
End-to-end encrypted. Capability-based. No full filesystem access.
Install in seconds
curl -sSL https://clawgate.io/install.sh | sh
The Challenge
You're running OpenClaw, Claude Code, or any AI on an isolated machine. Smart. But now it needs to read your code...
Full filesystem access. Agent gets pwned → you get pwned.
Credentials stored on agent machine. Same problem.
Tedious. Breaks flow. Doesn't scale.
Your code on someone else's servers.
The Answer
Grant specific paths, specific operations, for specific time. Nothing more.
Assumes the agent machine is compromised. Because it might be.
Grant ~/projects/app/** not "everything". Scoped access.
Tokens expire. 1 hour, 24 hours, 7 days — you choose.
Every operation logged with path, timestamp, and result.
Get Started
On your primary machine (laptop/workstation)
curl -sSL https://clawgate.io/install.sh | sh
clawgate keygen
Create a time-limited token for specific paths
clawgate grant --read "~/projects/**" --ttl 24h > token.txt
# Copy token.txt and public.key to agent machine
On the isolated machine (Mac Mini, VPS, container)
clawgate token add "$(cat token.txt)"
clawgate --mode agent
Back on your primary machine
clawgate --mode resource --connect <agent-ip>:4223
Compatibility
Skill files for CLI-based agents. MCP server for tool-based agents.
Skill file (CLI)
Skill file + MCP
MCP server
Skill file + MCP
Skill file + MCP
Defense in Depth
Multiple layers of protection. Assume breach at every layer.
| Layer | Protection |
|---|---|
| Transport | X25519 + XChaCha20-Poly1305 end-to-end encryption |
| Forward Secrecy | Fresh ephemeral keys per session |
| Authentication | Ed25519 signed JWT capability tokens |
| Authorization | Per-request path scope validation |
| Path Safety | Canonicalization, symlink rejection, traversal protection |
| Forbidden Paths | ~/.ssh, ~/.aws, ~/.gnupg — hardcoded, ungrantable |
| Time Limits | Tokens expire, limiting blast radius |
| Audit Trail | Every operation logged locally |
Security Guarantees
X25519 key exchange + XChaCha20-Poly1305. Forward secrecy per session.
Unforgeable capability tokens. Self-contained, no database needed.
~/.ssh, ~/.aws, ~/.gnupg — hardcoded blocked. Always.
Add tokens while running. No restarts. No reconnects.
Connection drops? Reconnects automatically. Seamless.
Single binary. No runtime. No supply chain risk.
See it in action
Demo video coming soon
Stop exposing your entire filesystem. Start using capability-based access.