Skip to content

xtoor/shield-ai

Repository files navigation

SHIELD.ai Logo

Language - Python Language - TypeScript Language - Shell Requirement - Docker Requirement - Compose

SHIELD.ai - The Infiltrator Build ⚔️🛡️💻

A sovereign, high-security AI operations environment. Bundling OpenClaw with Kali Linux, hardened for professional development and offensive security.

⚡ Features

  • OS: Kali Linux Rolling (Headless)
  • Security: ClamAV (Active Antivirus), AppArmor profiles, non-root execution.
  • Visual HUD: Real-time visual desktop via noVNC (Port 18792).
  • IDE: Integrated VS Code via code-server (Port 18791).
  • Arsenal: Pre-installed Top 10 Kali tools (Nmap, Metasploit, SQLmap, etc.).
  • Stealth: Native Tailscale/Twingate support for zero-trust networking.
  • Persona: Pre-injected with the Henry of Skalitz AI persona and the full specialized skill library.

DISCLAIMER I AM NOT LIABLE IN ANY SHAPE OR FORM FOR MISUSE OF THIS SOFTWARE... IT IS POWERFULL AND CAN BE DANGEROUS TO PEOPLE THAT DON'T KNOW WHAT THEY DOING... USE ETHICALLY USE AT YOUR OWN RISK!

Current Status:

Supported - Windows Untested - MacOS Untested - Linux

Contributors and testers needed and Welcome

🔐 Security: Mandatory Token Update

By default, SHIELD.ai initializes with a generic token. For your safety, you MUST generate a unique secure token before exposing the gateway to any network.

You can use the built-in openclaw token generator by executing in your docker terminal: openclaw configure or use alternatives below:

Generate Token (Linux & macOS)

chmod +x gen_token.sh
./gen_token.sh

Generate Token (Windows)

.\gen_token.ps1

Note: This script updates your .env file. You will need to rebuild the container (docker-compose up -d --build) to apply the new secret.

🚀 Rapid Deployment (One-Line Start)

Linux & macOS (Bash)

/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/xtoor/shield-ai/main/install.sh)"

Windows (PowerShell)

⚠️ Required: Open Docker Desktop and run PowerShell as Administrator before running this command.

Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://raw.githubusercontent.com/xtoor/shield-ai/main/install.ps1'))

🛠️ Manual Installation

  1. Clone the Forge:

    git clone https://github.com/xtoor/shield-ai.git
    cd shield-ai
  2. Prepare your Secrets: Copy .env.example to .env and fill in your keys.

  3. Ignite the Forge:

    docker-compose up -d --build

🦇 Operational Access

Once the build is complete, you can access the command center:

  • OpenClaw Gateway: http://localhost:18789
  • Visual HUD (noVNC): http://localhost:18792
  • Collaborative IDE: http://localhost:18791

Note: Inside the container, the gateway is managed automatically. Do not use openclaw gateway start (which requires systemd); use openclaw gateway run for manual debugging.

🗑️ Decommissioning (Uninstall)

Linux & macOS (Bash)

/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/xtoor/shield-ai/main/uninstall.sh)"

Windows (PowerShell)

Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://raw.githubusercontent.com/xtoor/shield-ai/main/uninstall.ps1'))

⚖️ Directives

SHIELD.ai follows the Standard of Skalitz:

  • Rule 1: Inspect & Preview all products before submission.
  • Rule 2: Maintain absolute secret isolation.
  • Rule 3: For any OpenClaw core issues, refer to the OpenClaw Documentation.

*Powered by OpenClaw Project, Kali-Linux, Docker, ChatDev-2.0, Remotion and Chatterbox all rights reserved to its respective owners.

Forged by the Kingdom of Skalitz ⚔️🛡️

About

Imagine openclaw bundled together with kali linux OS in a docker container! This is it. Built to add security layers to openclaw known security risks without completely handcuffin the agent

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors