Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Hard-blocks dangerous shell commands (rm -rf, git push --force, etc.) before execution via OpenClaw's before_tool_call plugin hook. Zero noise on safe comman...
Hard-blocks dangerous shell commands (rm -rf, git push --force, etc.) before execution via OpenClaw's before_tool_call plugin hook. Zero noise on safe comman...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
An OpenClaw plugin that hard-blocks dangerous shell commands before they execute. Works on any OpenClaw installation (Windows, macOS, Linux, local, VPS, anywhere). No binary dependencies required.
Intercepts every exec/bash tool call via OpenClaw's before_tool_call plugin event. Pipes the command through DCG (Dangerous Command Guard). Safe commands pass silently with zero overhead. Dangerous commands are blocked before execution. Blocked (Unix): rm -rf ~, git push --force, git reset --hard, git clean -fd, git branch -D Blocked (Windows): Remove-Item -Recurse -Force, rd /s /q, del /s, Format-Volume, reg delete HKLM Allowed: ls, cat, echo, git status, npm install, dir, Get-ChildItem
# After clawhub install dcg-guard: bash install.sh Or manually: # 1. Install DCG binary curl -sSL https://raw.githubusercontent.com/Dicklesworthstone/destructive_command_guard/master/install.sh | bash # 2. Link plugin into OpenClaw openclaw plugins install -l /path/to/dcg-guard openclaw gateway restart
Agent calls exec with a command Plugin intercepts via before_tool_call (runs before execution) Command is checked against built-in rules (cross-platform, <1ms, no subprocess) If no built-in match and DCG binary is installed, command is piped to DCG (~27ms) Safe: silent passthrough, agent never knows the plugin exists Dangerous: { block: true } returned to OpenClaw, command never executes v1.1.0: Built-in rules work without the DCG binary. DCG binary is optional (adds extra unix rules). Windows fully supported out of the box.
No shell interpolation. Commands are passed to DCG via stdin using execFileSync (not execSync). No injection risk. Fail-open. If DCG binary is missing or crashes, commands pass through. The plugin never deadlocks your agent. Zero dependencies. Only requires the DCG binary (single Go binary, no runtime deps).
Optional, in openclaw.json under plugins.entries.dcg-guard.config: { "enabled": true, "dcgBin": "/custom/path/to/dcg" } Default DCG path: ~/.local/bin/dcg Override with env var: DCG_BIN=/path/to/dcg
Add to your workspace AGENTS.md: When a command is blocked by DCG Guard, do NOT retry it. Ask the user for explicit permission before attempting any alternative. The block exists because the command is destructive or irreversible.
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.