Security
Configure sender controls, folder policy, and network guard in Msty Claw
Security in Claw is practical and layered: control who can trigger bots, what files they can access, and where they can connect. The goal is safe execution without blocking useful work.
Open Settings > Security to configure baseline controls.
Security model at a glance
Use these controls together:
- Sender Groups: who can invoke bots and channel presets
- Allowed Folders: where bots can read/write
- Blocked Patterns: sensitive paths blocked even inside allowed roots
- Network Guard: outbound network restrictions
- Approvals: confirmation checkpoints for higher-risk actions
Sender controls
Use Sender Groups to define who can run what.
- Create reusable groups (team, service users, trusted operators)
- Assign groups to bots and channel presets
- Use
Anyoneonly for intentionally open contexts
Guidance:
- Keep production bots restricted by default
- Avoid reusing wide-open groups on privileged bots
Folder policy
Use Allowed Folders and Blocked Patterns together.
- Allowed roots define bot operating boundaries
- Each root can be read/write or read-only
- Blocked patterns protect sensitive material inside allowed roots
Common blocked patterns include:
.ssh.gnupg.aws.envcredentialsprivate_keyid_rsaid_ed25519
Guidance:
- Start with project-specific roots, not broad home-directory roots
- Prefer read-only access for reference sources
Network Guard
Available presets:
RecommendedPrivacyStrictApproved Only
You can also define custom allow/deny hosts for finer control.
Guidance:
- Start with
Recommended - Move to stricter presets for sensitive automations
- Treat
Approved Onlyas production-hardened mode
Approval model
Claw can request approvals for sensitive actions. Keep approvals enabled until policies are stable and tested under real workflows.
Useful operator loop:
- Review approval prompts during rollout
- Adjust bot scope and permissions
- Re-run and confirm fewer unnecessary prompts
Practical security baseline
- Restrict sender groups before enabling shared channels
- Limit each bot to project-specific folders
- Add organization-specific sensitive patterns to blocklist
- Use a conservative Network Guard preset for production bots
- Keep approval prompts on for high-risk capabilities