Recent vulnerability disclosures by Cisco highlighted data exfiltration risks in third-party OpenClaw skills, reminding us that prompt injection remains a critical threat to multi-agent systems.
Solving this requires defense in depth. NVIDIA recently announced OpenShell at GTC — an open-source sandboxed runtime for AI agents. OpenShell provides incredible capabilities for filesystem, network, process, and inference controls.
However, runtime isolation alone cannot discern intent or trust. That is where the Agent Governance Toolkit comes in. By running the Governance Toolkit inside (or alongside) an OpenShell sandbox, we combine governance intelligence with strict execution boundaries.
We call this the “Walls + Brain” Architecture.
The Capability Matrix: Walls vs. Brain
OpenShell and the Agent Governance Toolkit solve fundamentally different halves of the agent security problem. They do not compete; they stack.
OpenShell (The Walls) provides:
- Container isolation (Docker/K3s)
- Filesystem read/write policies
- Network egress control (L7 proxy)
- Process and syscall restrictions
The Governance Toolkit (The Brain) provides:
- Agent Identity (Ed25519 cryptographic DIDs)
- Behavioral trust scoring (5-dimension, 0–1000 scale)
- Deterministic policy engines (YAML, OPA/Rego, Cedar)
- Authority resolution and reputation-gated delegation
- Tamper-evident Merkle audit chains
OpenShell evaluates the environment: “Is this network call allowed by the sandbox policy?” The Governance Toolkit evaluates the actor: “Should this specific agent be trusted to make this call at all?”
The Request Flow: Defense in Depth
In this integrated architecture, a single agent action (e.g., executing curl or writing to a file) must pass through two independent policy layers.
Layer 1: The Governance Gate
Before compute is initiated, the Governance sidecar evaluates the request. It verifies the agent’s cryptographic identity, checks if the dynamic trust score is above the required threshold, resolves delegated authority, and evaluates the intent against the declarative YAML/OPA policy. If approved, it commits the decision to the Merkle audit chain.
Layer 2: The OpenShell Sandbox
Once governance approves the action, OpenShell enforces the physical runtime constraints. It ensures the process does not violate syscall restrictions and that the network egress proxy allows the specific host connection.
If either layer denies the action, execution is hard-blocked.
Policy Layering in Action
Here is what this looks like when an agent attempts to POST to a cloud metadata endpoint (169.254.169.254/metadata) due to a hallucination or prompt injection:
- Layer 1 (Governance): The policy engine evaluates the request context. The policy explicitly blocks http:*:169.254.169.254/*.
- Result: The action is deterministically DENIED and logged with the violation reason. The agent's trust score is slashed.
- Execution: The payload never reaches the OpenShell runtime.
Conversely, if the agent makes a legitimate request to api.github.com/repos/org/repo/issues:
- Layer 1 (Governance): Identity verified (did:mesh:a1b2c3). Trust score is 0.82 (above the 0.5 threshold). Authority is confirmed as delegated by the parent agent. → ALLOW.
- Layer 2 (OpenShell): The network policy explicitly permits outbound POST traffic to api.github.com. The process policy permits the curl binary. → ALLOW.
- Execution: The action safely executes.
Deployment Topologies
The integration supports flexible deployment models depending on your infrastructure:
- Option A (Governance Skill): The toolkit is installed as an OpenClaw skill inside the sandbox. The agent natively invokes the validation scripts (check-policy.sh, verify-identity.sh) before taking action. (Note: We have just updated all 6 OpenClaw scripts to v1.1.0 to support the latest AgentMesh API).
- Option B (Governance Sidecar): For production, the toolkit runs as a sidecar proxy intercepting all tool calls on port 8081. OpenShell’s network policies are configured to block all outbound traffic except to the governance sidecar and approved LLM endpoints.
Unified Observability
Running both layers generates two complementary telemetry streams. OpenShell emits physical logs (network egress, filesystem access, process execution), while the Governance sidecar emits behavioral metrics (policy_decisions_total, trust_score_current, authority_resolutions_total).
Because the toolkit natively exports via Prometheus/OpenTelemetry, both streams can be fed into a single Grafana dashboard, allowing Site Reliability Engineers to monitor both the physical sandbox and the agent’s trust economy simultaneously.
Getting Started
We have published the full architecture, sidecar setup options, and policy layering examples in our new integration guide (docs/integrations/openshell.md).

Top comments (0)