<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Rajarshi Datta</title>
    <description>The latest articles on DEV Community by Rajarshi Datta (@rajarshidattapy).</description>
    <link>https://dev.to/rajarshidattapy</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2602962%2F95ef7514-64bf-4f03-9863-d1805fc224b3.jpeg</url>
      <title>DEV Community: Rajarshi Datta</title>
      <link>https://dev.to/rajarshidattapy</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rajarshidattapy"/>
    <language>en</language>
    <item>
      <title>ClawNet: Building an AI powered Security Terminal with OpenClaw for Real-Time Threat Detection</title>
      <dc:creator>Rajarshi Datta</dc:creator>
      <pubDate>Sun, 26 Apr 2026 21:33:30 +0000</pubDate>
      <link>https://dev.to/rajarshidattapy/clawnet-building-an-ai-powered-security-terminal-with-openclaw-for-real-time-threat-detection-1g82</link>
      <guid>https://dev.to/rajarshidattapy/clawnet-building-an-ai-powered-security-terminal-with-openclaw-for-real-time-threat-detection-1g82</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a submission for the &lt;a href="https://dev.to/challenges/openclaw-2026-04-16"&gt;OpenClaw Challenge&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ClawNet — AI Security Terminal Powered by OpenClaw
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What I Built
&lt;/h2&gt;

&lt;p&gt;We all have a habit of downloading open-source GitHub repos, random tools, scripts, cracked installers, and trying new software without really knowing what they’re doing in the background.&lt;/p&gt;

&lt;p&gt;The problem is simple: unless you already have strong endpoint security running, you usually have zero visibility into what these processes are doing on your machine.&lt;/p&gt;

&lt;p&gt;That’s where &lt;strong&gt;ClawNet&lt;/strong&gt; comes in.&lt;/p&gt;

&lt;p&gt;ClawNet is a Windows-native AI-powered interactive security terminal that continuously monitors live network connections, maps them to running processes, detects suspicious behavior, and uses OpenClaw to explain whether something is safe, suspicious, or critical.&lt;/p&gt;

&lt;p&gt;Instead of just showing “unknown.exe connected to 185.xxx.xxx.xxx,” it tells you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;why it’s dangerous&lt;/li&gt;
&lt;li&gt;whether it looks like malware or C2 beaconing&lt;/li&gt;
&lt;li&gt;whether the binary is suspicious&lt;/li&gt;
&lt;li&gt;whether you should kill the process or block the IP&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It acts like an intelligent network watchdog between the user and hidden threats. &lt;/p&gt;

&lt;p&gt;Core value:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Detection → Analysis → Explanation → Response&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Not just alerts. Actual decisions.&lt;/p&gt;




&lt;h2&gt;
  
  
  How I Used OpenClaw
&lt;/h2&gt;

&lt;p&gt;OpenClaw is the brain of ClawNet.&lt;/p&gt;

&lt;p&gt;The system first monitors active TCP/UDP connections using &lt;code&gt;psutil&lt;/code&gt;, maps each connection to the exact process running on Windows, checks file paths, suspicious ports, VPN state, GeoIP location, and process legitimacy.&lt;/p&gt;

&lt;p&gt;Then OpenClaw takes over.&lt;/p&gt;

&lt;h3&gt;
  
  
  OpenClaw powers:
&lt;/h3&gt;

&lt;h3&gt;
  
  
  1. AI Threat Classification
&lt;/h3&gt;

&lt;p&gt;Every suspicious connection is sent to OpenClaw (GPT-4o-mini engine) where it classifies it into:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SAFE&lt;/li&gt;
&lt;li&gt;SUSPICIOUS&lt;/li&gt;
&lt;li&gt;CRITICAL&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It returns structured JSON with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;threat level&lt;/li&gt;
&lt;li&gt;reasoning&lt;/li&gt;
&lt;li&gt;action recommendation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"level"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"CRITICAL"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"reason"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Unsigned binary connecting to high-risk foreign ASN"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"action"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"kill_and_block"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This removes false positives and turns noisy logs into useful decisions. &lt;/p&gt;




&lt;h3&gt;
  
  
  2. Persistent Threat Memory
&lt;/h3&gt;

&lt;p&gt;I added memory using &lt;strong&gt;Supermemory SDK&lt;/strong&gt; with local JSON fallback.&lt;/p&gt;

&lt;p&gt;This means ClawNet remembers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;suspicious IPs&lt;/li&gt;
&lt;li&gt;repeated malicious processes&lt;/li&gt;
&lt;li&gt;previous kill/block decisions&lt;/li&gt;
&lt;li&gt;flagged binaries&lt;/li&gt;
&lt;li&gt;user approvals/rejections&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Without memory:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“node.exe looks suspicious”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;With memory:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“node.exe connected to this IP 3 times this week and was previously marked suspicious”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This dramatically reduces hallucinations and improves context-aware threat analysis. &lt;/p&gt;




&lt;h3&gt;
  
  
  3. Telegram Remote Alerts
&lt;/h3&gt;

&lt;p&gt;Critical threats trigger Telegram alerts instantly.&lt;/p&gt;

&lt;p&gt;So even if I’m away from my machine, I can get:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;threat alerts&lt;/li&gt;
&lt;li&gt;severity score&lt;/li&gt;
&lt;li&gt;reason for detection&lt;/li&gt;
&lt;li&gt;recommended action&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This makes it useful beyond a local terminal and closer to a lightweight personal SOC system. &lt;/p&gt;




&lt;h3&gt;
  
  
  4. Copilot Security Mode
&lt;/h3&gt;

&lt;p&gt;There’s also an interactive “Copilot Mode” where I can ask:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Why is node.exe connecting to this foreign IP?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;and OpenClaw explains it in plain English like a security analyst would.&lt;/p&gt;

&lt;p&gt;This makes it useful for both technical and non-technical users.&lt;/p&gt;




&lt;h2&gt;
  
  
  Demo
&lt;/h2&gt;

&lt;p&gt;  &lt;iframe src="https://www.youtube.com/embed/PLszsQYIHIs"&gt;
  &lt;/iframe&gt;
&lt;/p&gt;

&lt;h3&gt;
  
  
  GitHub Repo
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Project Repository:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://github.com/rajarshidattapy/clawnet" rel="noopener noreferrer"&gt;https://github.com/rajarshidattapy/clawnet&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Example Workflow
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;unknown.exe → foreign IP → unsigned binary

↓

OpenClaw analyzes behavior

↓

CRITICAL threat detected

↓

Telegram alert sent

↓

Suggested action:
kill process + block IP
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Live Terminal Experience
&lt;/h3&gt;

&lt;p&gt;ClawNet runs as an interactive terminal showing:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;active network connections&lt;/li&gt;
&lt;li&gt;process names&lt;/li&gt;
&lt;li&gt;remote IPs&lt;/li&gt;
&lt;li&gt;risk scoring&lt;/li&gt;
&lt;li&gt;AI-generated verdicts&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;with autonomous response recommendations.&lt;/p&gt;




&lt;h2&gt;
  
  
  What I Learned
&lt;/h2&gt;

&lt;p&gt;The biggest thing I learned:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security tools fail when they only show data.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Users don’t need more logs.&lt;br&gt;
They need decisions.&lt;/p&gt;

&lt;p&gt;Raw monitoring is easy.&lt;br&gt;
Context-aware threat reasoning is hard.&lt;/p&gt;

&lt;p&gt;That’s where OpenClaw became genuinely powerful.&lt;/p&gt;

&lt;p&gt;Another major realization was how important memory is.&lt;/p&gt;

&lt;p&gt;Without persistent memory, AI keeps re-analyzing the same threats like they’re new. With memory, it starts behaving like an actual security system instead of a stateless chatbot.&lt;/p&gt;

&lt;p&gt;I also learned that building autonomous recommendations is far more useful than simple detection.&lt;/p&gt;

&lt;p&gt;People don’t want:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“This looks suspicious”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;They want:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Kill this right now.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;That shift changes everything.&lt;/p&gt;




&lt;h2&gt;
  
  
  ClawCon Michigan
&lt;/h2&gt;

&lt;p&gt;I did not attend ClawCon Michigan, but building ClawNet made me realize how powerful personal AI infrastructure can become when it moves from “assistant” to “operator.”&lt;/p&gt;

&lt;p&gt;OpenClaw feels less like prompting an LLM and more like building an actual intelligent system.&lt;/p&gt;

&lt;p&gt;That’s the future I’m interested in building.&lt;/p&gt;




&lt;p&gt;ClawNet is not just another monitoring tool.&lt;/p&gt;

&lt;p&gt;It’s an AI security layer for the open-source era—where we install first and regret later.&lt;/p&gt;

</description>
      <category>devchallenge</category>
      <category>openclawchallenge</category>
    </item>
  </channel>
</rss>
