FalcoClaw mascot

Runtime Security for
AI Agents & Linux

Falco detects threats at the kernel level. FalcoClaw responds in milliseconds.

Go Apache 2.0 Docker CI
docker run -d --privileged -v /var/log:/var/log ghcr.io/thnkbig/falcoclaw:latest # ready in seconds

Security that responds, not just alerts

Process Termination

Kill malicious processes before they can act. Shell injection, privilege escalation — stopped at first exec.

🚫

IP Blocking

Drop attackers at the iptables level in milliseconds. Block inbound intrusions and outbound C2 callbacks.

📦

File Quarantine

Isolate suspicious files with immutable flags. Malware cannot persist, even if it runs again.

🤖

Agent Dispatch

Send alerts to OpenClaw, Hermes, or any agent framework. Trigger AI-powered investigation pipelines.

Millisecond Response

No LLM in the kill chain. Deterministic execution — response fires in the same event loop as detection.

📋

YAML Rules

Define response policies in simple, auditable YAML. No code. No custom logic. Just rules.

Four steps from detection to response

1

Falco detects a syscall-level threat

Falco monitors system calls using the kernel audit subsystem. When a rule matches — shell spawned from Python, unauthorized exec — it emits a structured event.

2

FalcoClaw receives the event

FalcoClaw subscribes to the Falco output stream. It enriches events with process tree, file metadata, user context, and matched rule.

3

Response actions execute in milliseconds

Based on your YAML rules, FalcoClaw fires the configured response: kill the process, block the IP, quarantine the file, or dispatch to an agent webhook.

4

Agents investigate and remediate

Webhook payloads land in your agent pipeline. Agents take further action — revoke credentials, isolate workloads, alert your team.

Deploy in minutes

Docker

Run with full system access. Requires --privileged for Falco audit access.

docker run -d --privileged \ -v /var/log:/var/log \ ghcr.io/thnkbig/falcoclaw:latest

Binary

Download the Linux amd64 binary from GitHub Releases.

curl -fsSL \ https://github.com/thnkbig/falcoclaw/releases/latest/download/falcoclaw_linux_amd64.tar.gz \ | tar xz && sudo ./falcoclaw server

Falco config

Point Falco at FalcoClaw webhook intake.

# /etc/falco/falco.yaml json_output: true http_output: enabled: true url: http://localhost:2804/webhook

Open source. Production ready.

Apache 2.0 licensed. Built by THNKBIG Technologies.