🛡️ Supply Chain Security Module Added

Local-first security operations,
across all platforms.

SecOpsAI collects telemetry from OpenClaw, macOS, Linux, and Windows, then turns it into findings, correlations, and threat-intel matches you can review locally.

No log shipping by default
SQLite SOC store
OpenClaw plugin included
macOS / Linux / Windows
secopsai — local pipeline
$ secopsai refresh --platform macos,openclaw
[OK] Collected host + OpenClaw telemetry
[OK] Findings persisted to local SOC store (SQLite)
$ secopsai-supply-chain check --project-path .
✓ 8 packages scanned
⚠ 1 suspicious package detected
$ secopsai correlate
[OK] Cross-platform correlation complete
$ secopsai list --severity high
⚠ HIGH: Suspicious execution / policy abuse detected
SCF-… | npm package | status=open | disposition=unreviewed

Install SecOpsAI

Works everywhere. Installs everything. Select your platform below.

Detected: macOS

One-liner install

The fastest way to get started. Installs Python, dependencies, and everything else for you.

curl -fsSL https://secopsai.dev/install.sh | bash
Supports: macOS, Linux, Windows (via WSL2)

Install via npm

For Node.js users who prefer package managers.

npm install -g secopsai
Requires: Node.js 18+

OpenClaw Plugin

Native TypeScript plugin for seamless OpenClaw integration. Install once, use 8 built-in tools directly from OpenClaw.

openclaw plugins install secopsai
Requires: OpenClaw 0.9+

macOS Installation

Install using the one-liner or Homebrew.

curl -fsSL https://secopsai.dev/install.sh | bash
Supports: macOS 10.15+ (Intel & Apple Silicon)

Linux Installation

Install using the one-liner on any Linux distribution.

curl -fsSL https://secopsai.dev/install.sh | bash
Supports: Ubuntu, Debian, Fedora, CentOS, Arch, and more

Windows Installation (WSL2 Required)

SecOpsAI requires a Linux environment. Windows users must use WSL2.

wsl --install -d Ubuntu
Step 1: Install WSL2 + Ubuntu
Step 2: Run the one-liner inside WSL

🛡️ Supply Chain Security

Detect and mitigate supply chain attacks on npm, PyPI, Vim, Emacs, and more. Protect your dependencies before they compromise your systems.

  • 📦 Malicious npm packages (axios@1.14.1)
  • 🐍 PyPI backdoors (litellm@1.82.7)
  • 📝 Editor exploits (Vim, Emacs)
  • 🐭 Runtime droppers and RATs
  • 🔤 Typosquatting attacks
Learn More
secopsai-supply-chain
$ secopsai-supply-chain check --project-path .

📦 Supply Chain Security Report
━━━━━━━━━━━━━━━━━━━━━━━━━━━━
✓ 8 Sigma detection rules active
✓ 8 YARA signatures loaded
✓ npm registry: CONNECTED

🔍 Scan Results:
  lodash@4.17.21      ✓ CLEAN
  axios@1.6.0         ✓ CLEAN
  react@18.2.0        ✓ CLEAN
  express@4.18.2      ✓ CLEAN
  
🛡️ No threats detected!
100+
Detection Rules
4
Platforms Supported
50K+
Lines of Code
0
External API Dependencies

Detect, triage, and act — locally

Everything you need for local-first security operations

🔌

OpenClaw Plugin

Native TypeScript plugin for seamless OpenClaw integration. Install once, use 8 built-in tools directly from OpenClaw.

🛡️

Supply Chain Security NEW

Detect malicious npm/PyPI packages, editor exploits (Vim, Emacs), and runtime droppers. 8 Sigma rules + 8 YARA signatures.

🧠

Adaptive Intelligence

Auto-generates detection rules from CVEs and threat feeds. Validates with F1 scores. Only deploys improving rules.

💬

WhatsApp Workflows

Use OpenClaw to interact with SecOpsAI from WhatsApp: "check malware", "show OCF-…", "mitigate OCF-…".

🎯

Threat Intel (IOCs)

Pull open-source IOCs, normalize + score them, optional local enrichment (DNS), then match against events.

🔒

Local-first

All data stays on your machine. SQLite SOC store. No log shipping by default. You own your security data.