Falco detects threats at the kernel level. FalcoClaw responds in milliseconds.
Kill malicious processes before they can act. Shell injection, privilege escalation — stopped at first exec.
Drop attackers at the iptables level in milliseconds. Block inbound intrusions and outbound C2 callbacks.
Isolate suspicious files with immutable flags. Malware cannot persist, even if it runs again.
Send alerts to OpenClaw, Hermes, or any agent framework. Trigger AI-powered investigation pipelines.
No LLM in the kill chain. Deterministic execution — response fires in the same event loop as detection.
Define response policies in simple, auditable YAML. No code. No custom logic. Just rules.
Falco monitors system calls using the kernel audit subsystem. When a rule matches — shell spawned from Python, unauthorized exec — it emits a structured event.
FalcoClaw subscribes to the Falco output stream. It enriches events with process tree, file metadata, user context, and matched rule.
Based on your YAML rules, FalcoClaw fires the configured response: kill the process, block the IP, quarantine the file, or dispatch to an agent webhook.
Webhook payloads land in your agent pipeline. Agents take further action — revoke credentials, isolate workloads, alert your team.
Run with full system access. Requires --privileged for Falco audit access.
Download the Linux amd64 binary from GitHub Releases.
Point Falco at FalcoClaw webhook intake.
Apache 2.0 licensed. Built by THNKBIG Technologies.