Documentation Index
Fetch the complete documentation index at: https://docs.raxe.ai/llms.txt
Use this file to discover all available pages before exploring further.
OpenClaw Integration
Protect your OpenClaw personal AI assistant from prompt injection, jailbreak attempts, and data exfiltration attacks.What is OpenClaw?
OpenClaw is a self-hosted personal AI assistant that connects to 13+ messaging channels including WhatsApp, Telegram, Slack, Discord, Signal, iMessage, and Teams. RAXE adds a security layer that scans all incoming messages before they reach the AI.Recommended Approach: MCPorter Integration
The recommended way to integrate RAXE with OpenClaw is via MCPorter, which gives your AI agent access to RAXE as a tool. The agent can then scan messages on-demand.Architecture
Available MCP Servers:
raxe (RAXE AI Security Scanner)
Tools: scan_prompt, list_threat_families, get_rule_info
MCPorter Tools Reference
MCPorter exposes three RAXE tools:| Tool | Purpose | Example |
|---|---|---|
scan_prompt | Scan text for security threats | mcporter call raxe.scan_prompt text="..." |
list_threat_families | List available threat categories | mcporter call raxe.list_threat_families |
get_rule_info | Get details about a specific rule | mcporter call raxe.get_rule_info rule_id="pi-001" |
How It Works
Configuration
Enable Blocking Mode
By default, RAXE logs threats but allows messages through. To block threats:- Environment Variable
- OpenClaw Config
Troubleshooting
mcporter not finding RAXE server
mcporter not finding RAXE server
Verify your mcporter configuration:If the MCP server works but mcporter doesn’t see it, check
./config/mcporter.json exists and has the correct format.RAXE command not found
RAXE command not found
Ensure RAXE is installed and in your PATH:If using a virtual environment, activate it before running OpenClaw commands.
Performance
| Mode | Latency (P50) | Latency (P95) |
|---|---|---|
| Default (L1 + L2) | ~3.5ms | ~5.5ms |
| L1 only | ~0.4ms | ~0.5ms |
Privacy
- All scanning happens locally
- Only prompt hashes are logged (not content)
- No cloud API calls required
- Matched patterns are never exposed
Next Steps
Detection Rules
Learn about RAXE’s 515+ detection rules
Custom Rules
Add your own detection patterns
Future: Native Message Hooks (Planned)
Future: Native Message Hooks (Planned)
OpenClaw’s hooks system currently supports command events (This will install a native hook that triggers on every inbound message without requiring MCPorter or agent-level configuration.
command:new, command:reset, command:stop), agent events (agent:bootstrap), and gateway events (gateway:startup).Message events (message:inbound, message:sent, message:received) are listed as “planned” in OpenClaw’s documentation but are not yet implemented (confirmed February 2026).Once message hooks are available, RAXE will support automatic scanning via: