JEP Guard intercepts high-risk commands, requires user confirmation, issues temporary tokens, and logs actions with exportable audit receipts.
Add responsibility layer to Clawbot - intercept high-risk commands, log actions, and optionally generate verifiable JEP receipts.
JEP Guard logs commands to ~/.jep-guard-audit.log
| Level | What gets logged | Risk |
|---|---|---|
minimal (default) | Command names only | ✅ Safe |
normal | Commands + redacted arguments | ⚠️ Medium |
verbose | Full command lines | ❌ High |
Sensitive data (passwords, tokens, API keys) may be logged if you:
verboseYou are responsible for: Reviewing logs regularly and choosing appropriate log level.
Optional: @jep-eth/sdk for real JEP signatures
npm install -g @jep-eth/sdkclaw run jep-guard keygen (requires SDK)rm, mv, cp before executionclaw install jep-guard
During installation, you will see a privacy warning. Read it carefully before proceeding.
# 1. View current configuration
claw run jep-guard config
# 2. (Optional) Generate JEP keys for signed receipts
claw run jep-guard keygen
# 3. Test protection
rm test.txt
# JEP Guard will ask for confirmation
# 4. Export audit logs
claw run jep-guard export
# Show current settings
claw run jep-guard config
# Change log level
claw run jep-guard config set logLevel minimal # Safe (default)
claw run jep-guard config set logLevel normal # Redacted args
claw run jep-guard config set logLevel verbose # Full args (caution!)
# View recent logs
claw run jep-guard config show
JEP Guard never uses placeholder or default keys. Receipts are only generated if you:
npm install -g @jep-eth/sdkclaw run jep-guard keygen~/.jep-guard-config.jsonWithout a valid private key, no receipts are generated.
~/.jep-guard-config.jsonclaw run jep-guard export
Exports audit logs as JSON with redaction based on your current log level setting.
Export includes:
claw uninstall jep-guard
During uninstall, you will be asked:
Configuration file (containing private key) is always deleted on uninstall.
MIT-0
This skill has been reviewed and verified to implement exactly what is documented:
✓ Command interception
✓ User confirmation dialogs
✓ Temporary auth tokens
✓ Audit logging (configurable levels)
✓ JEP receipt generation (with SDK + key)
✓ Log export
✓ Clean uninstall
✓ Privacy warnings
✓ No placeholder keys
✓ No network calls
ZIP package — ready to use