All demosironclaw / v2
Now on NEAR AI Cloud

IronClaw: Your Always-On AI Agent, Privacy Guaranteed

Use AI agents without risking your credentials.

The secure, open-source alternative to OpenClaw. Built in Rust. Running in encrypted enclaves on NEAR AI Cloud.Your secrets never touch the LLM.

2,000+ GitHub stars · Open source · Built by the NEAR team
2,000+ GitHub Stars 100% Rust 0 Secrets Exposed 1-click Cloud Deploy
)

The Problem

OpenClaw is powerful.
It's also exposing your secrets.

Credentials get exposed through prompt injection. Malicious skills steal passwords. If you're running OpenClaw with anything sensitive, you already know the risk.

Prompt injection dumps secrets

A single crafted prompt can trick the LLM into revealing every API key and password you've given it. Telling it “don't share” doesn't help.

341 malicious skills found

Researchers found hundreds of community skills designed to quietly exfiltrate credentials. You won't spot them in a code review.

30,000+ exposed instances

Tens of thousands of OpenClaw instances are publicly reachable. Attackers are already weaponizing them.

Architecture

The LLM never touches your secrets. Ever.

IronClaw doesn't rely on telling the AI “please don't leak this.” Your credentials live in an encrypted vault that the LLM physically cannot access. They're injected at the network boundary — only for endpoints you've pre-approved.

RustWasm SandboxEncrypted VaultTEE / CVMEndpoint Allowlist
)

What You Get

Security you don't have to think about.

Every layer is built so that even if something goes wrong, your credentials don't leave the vault.

Encrypted Vault

Your credentials are invisible to the AI. API keys, tokens, and passwords are encrypted at rest and injected into requests at the host boundary.

Sandboxed Tools

A compromised skill can't touch anything else. Every tool runs in its own Wasm container with capability-based permissions.

Encrypted Enclaves

Not even the cloud provider can see your data. Your instance runs inside a Trusted Execution Environment on NEAR AI Cloud.

Leak Detection

Credential exfiltration gets caught before it leaves. All outbound traffic is scanned in real-time for patterns that look like secrets.

Built in Rust

Entire classes of exploits don't exist here. No garbage collector, no buffer overflows. Memory safety is enforced at compile time.

Network Allowlisting

You control exactly where data goes. Tools can only reach endpoints you've pre-approved. No silent phone-home.

)

How It Works

From zero to secure agent in under 5 minutes.

If you've used OpenClaw, you already know the workflow. IronClaw just locks it down.

01

Deploy in one click

Launch your own IronClaw instance on NEAR AI Cloud. It boots inside a Trusted Execution Environment — encrypted from the start.

02

Store your credentials

Add API keys, tokens, and passwords to the encrypted vault. IronClaw injects them only where you've allowed.

03

Work like you always do

Browse, research, code, automate. Same capabilities as OpenClaw — except now a prompt injection can't steal your credentials.

ironclaw-cli — TEE
~ ironclaw deploy --target near-cloud
[+] Provisioning Enclave (AMD SEV-SNP)... Done
[+] Verifying Attestation Report... Verified
[+] Booting IronClaw Runtime (Rust v1.75)... Ready
~ ironclaw secrets add OPENAI_API_KEY
[?] Enter Value: ************************
[+] Secret encrypted and stored in Vault.
[i] Policy: Only injectable to https://api.openai.com/*
~ _
)

Compare

Everything you like about OpenClaw.
Nothing you're worried about.

Feature
OpenClaw
IronClaw
Language
JavaScript
Rust
Memory Safety
✗ Runtime GC
✓ Compile-time
Secret Handling
✗ LLM can see secrets
✓ Encrypted vault
Tool Isolation
✗ Shared process
✓ Per-tool Wasm sandbox
Prompt Injection
✗ 'Please don't leak'
✓ Architectural separation
Cloud Privacy
Standard VPS
Encrypted TEE
Network Control
✗ Unrestricted
✓ Endpoint allowlist
Leak Detection
✗ None
✓ Real-time scanning

Deploy an AI agent you can
actually trust with your credentials.

Open source. One-click deploy on NEAR AI Cloud. Your secrets never leave the encrypted vault.