Before destructive actions
Intercept deletes, bulk edits, payment calls, migrations, and risky shell commands before they execute.
HaltState sits between autonomous agents and the tools they call. Let OpenClaw read, plan, and act, while HaltState AI creates the right starter policies and checks them before anything destructive executes.
No YAML required. Generate policies with HaltState AI, ask the in-site support agent to help create them, then review, accept, and enforce them.
[
{
"name": "Require approval for shell commands",
"action_pattern": "shell.*",
"effect": "APPROVAL_REQUIRED",
"priority": 80
},
{
"name": "Block dangerous shell commands",
"action_pattern": "shell.*",
"effect": "DENY",
"conditions": [
{"path": "params.command", "op": "matches", "value": "rm -rf|mkfs|dd if="}
],
"priority": 95
},
{
"name": "Block file deletion outside allowed paths",
"action_pattern": "file.delete",
"effect": "DENY",
"conditions": [
{"path": "params.path", "op": "not_matches", "value": "^/safe-agent-workspace/"}
],
"priority": 90
}
]
The moment an agent can touch your shell, inbox, cloud account, or database, prompt instructions stop being enough. HaltState gives you a control point outside the model, and its AI can create the starter policies for you.
Intercept deletes, bulk edits, payment calls, migrations, and risky shell commands before they execute.
Prompt injection, confused goals, and tool hallucinations become policy decisions instead of live incidents.
Proof Packs preserve what the agent saw, what it attempted, who approved it, and what actually ran.
Connect OpenClaw tool calls to HaltState. The system can generate starter policies from a wizard, AI suggestions, or the in-site support agent, then the runtime enforces accepted policies before tools execute.
Delete a message, run a command, modify a repo, update a database, or call an API.
Policies match the action pattern, params, resource, account, dollar amount, actor, and current incident mode.
Safe calls continue. Risky calls wait for approval. Forbidden calls never reach the target system.
Every decision becomes an audit record for debugging, compliance, and incident response.
Tell HaltState what OpenClaw can access and how cautious you want to be. HaltState AI drafts the policies; you review, accept, edit, or dismiss them.
Require approval before deleting email, files, cloud objects, database rows, or tickets.
Allow commands inside a sandbox folder. Block recursive deletes, credential reads, and production paths.
Require approval before payments, paid API calls, ad spend, cloud scaling, or vendor changes.
Block destructive SQL and migrations unless a break-glass flow is explicitly approved.
Deny attempts to read keys, tokens, password stores, and environment files outside approved contexts.
Flip a global stop to block all agent writes while you inspect what happened.
Use the site chat support agent to help turn your OpenClaw setup into policy drafts inside HaltState.
Use the emergency checklist first. Stop the agent, rotate exposed secrets, preserve logs, and lock the risky integration before you restart automation.