SecOpsAI collects telemetry from OpenClaw, macOS, Linux, and Windows, then turns it into findings, correlations, and threat-intel matches you can review locally.
Works everywhere. Installs everything. Select your platform below.
The fastest way to get started. Installs Python, dependencies, and everything else for you.
curl -fsSL https://secopsai.dev/install.sh | bash
For Node.js users who prefer package managers.
npm install -g secopsai
Native TypeScript plugin for seamless OpenClaw integration. Install once, use 8 built-in tools directly from OpenClaw.
openclaw plugins install secopsai
Install using the one-liner or Homebrew.
curl -fsSL https://secopsai.dev/install.sh | bash
Install using the one-liner on any Linux distribution.
curl -fsSL https://secopsai.dev/install.sh | bash
SecOpsAI requires a Linux environment. Windows users must use WSL2.
wsl --install -d Ubuntu
Detect and mitigate supply chain attacks on npm, PyPI, Vim, Emacs, and more. Protect your dependencies before they compromise your systems.
$ secopsai-supply-chain check --project-path . 📦 Supply Chain Security Report ━━━━━━━━━━━━━━━━━━━━━━━━━━━━ ✓ 8 Sigma detection rules active ✓ 8 YARA signatures loaded ✓ npm registry: CONNECTED 🔍 Scan Results: lodash@4.17.21 ✓ CLEAN axios@1.6.0 ✓ CLEAN react@18.2.0 ✓ CLEAN express@4.18.2 ✓ CLEAN 🛡️ No threats detected!
Everything you need for local-first security operations
Native TypeScript plugin for seamless OpenClaw integration. Install once, use 8 built-in tools directly from OpenClaw.
Detect malicious npm/PyPI packages, editor exploits (Vim, Emacs), and runtime droppers. 8 Sigma rules + 8 YARA signatures.
Auto-generates detection rules from CVEs and threat feeds. Validates with F1 scores. Only deploys improving rules.
Use OpenClaw to interact with SecOpsAI from WhatsApp: "check malware", "show OCF-…", "mitigate OCF-…".
Pull open-source IOCs, normalize + score them, optional local enrichment (DNS), then match against events.
All data stays on your machine. SQLite SOC store. No log shipping by default. You own your security data.