A sovereign, high-security AI operations environment. Bundling OpenClaw with Kali Linux, hardened for professional development and offensive security.
- OS: Kali Linux Rolling (Headless)
- Security: ClamAV (Active Antivirus), AppArmor profiles, non-root execution.
- Visual HUD: Real-time visual desktop via noVNC (Port 18792).
- IDE: Integrated VS Code via
code-server(Port 18791). - Arsenal: Pre-installed Top 10 Kali tools (Nmap, Metasploit, SQLmap, etc.).
- Stealth: Native Tailscale/Twingate support for zero-trust networking.
- Persona: Pre-injected with the Henry of Skalitz AI persona and the full specialized skill library.
DISCLAIMER I AM NOT LIABLE IN ANY SHAPE OR FORM FOR MISUSE OF THIS SOFTWARE... IT IS POWERFULL AND CAN BE DANGEROUS TO PEOPLE THAT DON'T KNOW WHAT THEY DOING... USE ETHICALLY USE AT YOUR OWN RISK!
Contributors and testers needed and Welcome
By default, SHIELD.ai initializes with a generic token. For your safety, you MUST generate a unique secure token before exposing the gateway to any network.
You can use the built-in openclaw token generator by executing in your docker terminal: openclaw configure or use alternatives below:
chmod +x gen_token.sh
./gen_token.sh.\gen_token.ps1Note: This script updates your .env file. You will need to rebuild the container (docker-compose up -d --build) to apply the new secret.
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/xtoor/shield-ai/main/install.sh)"
⚠️ Required: Open Docker Desktop and run PowerShell as Administrator before running this command.
Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://raw.githubusercontent.com/xtoor/shield-ai/main/install.ps1'))-
Clone the Forge:
git clone https://github.com/xtoor/shield-ai.git cd shield-ai -
Prepare your Secrets: Copy
.env.exampleto.envand fill in your keys. -
Ignite the Forge:
docker-compose up -d --build
Once the build is complete, you can access the command center:
- OpenClaw Gateway:
http://localhost:18789 - Visual HUD (noVNC):
http://localhost:18792 - Collaborative IDE:
http://localhost:18791
Note: Inside the container, the gateway is managed automatically. Do not use
openclaw gateway start(which requires systemd); useopenclaw gateway runfor manual debugging.
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/xtoor/shield-ai/main/uninstall.sh)"Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://raw.githubusercontent.com/xtoor/shield-ai/main/uninstall.ps1'))SHIELD.ai follows the Standard of Skalitz:
- Rule 1: Inspect & Preview all products before submission.
- Rule 2: Maintain absolute secret isolation.
- Rule 3: For any OpenClaw core issues, refer to the OpenClaw Documentation.
*Powered by OpenClaw Project, Kali-Linux, Docker, ChatDev-2.0, Remotion and Chatterbox all rights reserved to its respective owners.
Forged by the Kingdom of Skalitz ⚔️🛡️
