✓ Verified 💻 Development ✓ Enhanced Data

Gatewaystack Governance

Deny-by-default governance for every tool call — identity, scope, rate limiting, injection detection

Rating
4.4 (395 reviews)
Downloads
6,160 downloads
Version
1.0.0

Overview

Deny-by-default governance for every tool call — identity, scope, rate limiting, injection detection, audit.

Complete Documentation

View Source →

GatewayStack Governance

Deny-by-default governance for every tool call in OpenClaw.

Five core checks run automatically on every invocation:

  • Identity — maps the agent to a policy role. Unknown agents are denied.
  • Scope — deny-by-default tool allowlist. Unlisted tools are blocked.
  • Rate limiting — per-user and per-session sliding window limits.
  • Injection detection — 40+ patterns from Cisco, Snyk, and Kaspersky research.
  • Audit logging — every decision recorded to append-only JSONL.
Three opt-in features extend governance further:
  • Output DLP — scans tool output for PII using @gatewaystack/transformabl-core. Log or redact.
  • Escalation — human-in-the-loop review for medium-severity detections and first-time tool use.
  • Behavioral monitoring — detects anomalous tool usage patterns using @gatewaystack/limitabl-core.

Install

bash
openclaw plugins install @gatewaystack/gatewaystack-governance

One command. Zero config. The core 5 checks are active on every tool call immediately.

The plugin hooks into before_tool_call at the process level — the agent can't bypass it, skip it, or talk its way around it.

Customize

To override the defaults, create a policy file:

bash
cp ~/.openclaw/plugins/gatewaystack-governance/policy.example.json \
   ~/.openclaw/plugins/gatewaystack-governance/policy.json

Configure which tools are allowed, who can use them, rate limits, injection detection sensitivity, and the three optional features (DLP, escalation, behavioral monitoring — all disabled by default).

Optional GatewayStack packages

The opt-in features use GatewayStack packages via lazy import. Install only what you need:

bash
npm install @gatewaystack/transformabl-core   # for output DLP
npm install @gatewaystack/limitabl-core       # for behavioral monitoring

The core 5 checks have zero external dependencies and work without these packages.

Links

  • GitHub — source, docs, getting started guide
  • npm — package registry
  • MIT licensed

Installation

Terminal bash

openclaw install gatewaystack-governance
    
Copied!

💻Code Examples

openclaw plugins install @gatewaystack/gatewaystack-governance

openclaw-plugins-install-gatewaystackgatewaystack-governance.txt
One command. Zero config. The core 5 checks are active on every tool call immediately.

The plugin hooks into `before_tool_call` at the process level — the agent can't bypass it, skip it, or talk its way around it.

## Customize

To override the defaults, create a policy file:

~/.openclaw/plugins/gatewaystack-governance/policy.json

-openclawpluginsgatewaystack-governancepolicyjson.txt
Configure which tools are allowed, who can use them, rate limits, injection detection sensitivity, and the three optional features (DLP, escalation, behavioral monitoring — all disabled by default).

## Optional GatewayStack packages

The opt-in features use GatewayStack packages via lazy import. Install only what you need:

Tags

#coding_agents-and-ides

Quick Info

Category Development
Model Claude 3.5
Complexity One-Click
Author davidcrowe
Last Updated 3/10/2026
🚀
Optimized for
Claude 3.5
🧠

Ready to Install?

Get started with this skill in seconds

openclaw install gatewaystack-governance