Local-first security operations,
across OpenClaw and host platforms.
SecOpsAI collects telemetry from OpenClaw, macOS, Linux, and Windows, then turns it into findings, correlations, and threat-intel matches you can review locally. All data stays on your machine.
Detect, triage, and act - locally
SecOpsAI is a local-first security operations toolkit for OpenClaw and host platforms. It collects telemetry, produces findings with severity and evidence, and supports fast CLI and chat-driven triage workflows.
OpenClaw Plugin
Native TypeScript plugin for seamless OpenClaw integration. Install once, use 8 built-in tools directly from OpenClaw.
WhatsApp workflows
Use OpenClaw to interact with SecOpsAI from WhatsApp: "check malware", "check exfil", "show OCF-…", "mitigate OCF-…".
Threat Intel (IOCs)
Pull open-source IOCs, normalize + score them, optional local enrichment (DNS), then match against replay events to generate TI findings.
Coming soon integrations
OpenClaw variants
Native integrations with other OpenClaw variants/telemetry sources are coming soon: Hermes, ManusAI, Zo Computer.
SIEM platforms (optional)
Optional SIEM output integrations are coming soon: Splunk and Elastic (Elasticsearch).
(Still local-first by default - exporting is opt-in.)
Install SecOpsAI
Works everywhere. Installs everything.
One-liner install for macOS
curl -fsSL https://secopsai.dev/install.sh | bash
The one-liner installs Python, dependencies, and everything else for you.
Zero to findings in minutes
After installation, run the pipeline and list findings. All data stays on your device unless you explicitly export it.
secopsai_list_findings severity=high
curl -fsSL https://secopsai.dev/install.sh | bash
cd ~/secopsai && source .venv/bin/activate
secopsai refresh && secopsai list --severity high
secopsai refresh --platform macos,openclaw && secopsai correlate
secopsai intel refresh && secopsai intel match --limit-iocs 500