Skip to content

Commit ea76d50

Browse files
committed
Add mvar-security stack cross-references — MVAR + ClawZero + ClawSeal ecosystem
Three-layer AI security infrastructure: - Runtime: MVAR (information flow control) - Execution: ClawZero (what the agent does) - Memory: ClawSeal (what the agent remembers) ClawZero enforces execution boundaries using MVAR's IFC.
1 parent d32190a commit ea76d50

1 file changed

Lines changed: 22 additions & 0 deletions

File tree

README.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,28 @@ ClawZero places a deterministic execution boundary between model output and tool
6262

6363
![ClawZero vs Standard OpenClaw](docs/assets/comparison.png)
6464

65+
## The mvar-security Stack
66+
67+
ClawZero is part of a three-layer AI security infrastructure:
68+
69+
| Layer | Tool | What it secures |
70+
|-------|------|-----------------|
71+
| **Runtime** | [MVAR](https://github.com/mvar-security/mvar) | How information flows through the agent |
72+
| **Execution** | **ClawZero** (this repo) | What the agent does |
73+
| **Memory** | [ClawSeal](https://github.com/mvar-security/ClawSeal) | What the agent remembers |
74+
75+
**ClawZero enforces execution boundaries using MVAR's information flow control.**
76+
77+
For cryptographically verified persistent memory, add ClawSeal:
78+
```bash
79+
pip install clawseal
80+
```
81+
82+
For direct MVAR runtime integration (without OpenClaw-specific tooling):
83+
```bash
84+
pip install mvar-security
85+
```
86+
6587
## 30-Second Quickstart
6688

6789
```bash

0 commit comments

Comments
 (0)