INFRA SHIELD ALARMS
DECEPTION-BASED TRIPWIRES FOR AI INFRASTRUCTURE
Infra Shield Alarms are decoy resources that look indistinguishable from real credentials, files, and services. When anything accesses one, you get an instant alert. Deception-based alarms have very low noise.
WHY EVERY ALARM IS A TRUE POSITIVE
Infra Shield Alarms are resources that have no legitimate purpose. No process, user, or agent should ever access them in normal operation. If an alarm fires, something accessed your tripwire. Deception-based alarms have very low noise: only unauthorized access. The only question is whether the access was an insider threat, a compromised agent, or an external attacker.
OPENCLAW: 4 ALARMS AUTO-DEPLOYED
When you install OpenClaw Shield, four alarms deploy automatically with zero configuration. These cover the highest-risk attack surfaces specific to OpenClaw instances. All four are available on the FREE tier.
OPENCLAW CONFIG MONITOR
HIGHAlerts when the OpenClaw configuration file is read or written by an unexpected process. Config tampering is a common precursor to privilege escalation.
OPENCLAW CREDENTIALS MONITOR
CRITICALMonitors the credentials directory for unauthorized access. Credential theft here gives an attacker full API access to every provider OpenClaw can reach.
OPENCLAW GATEWAY MONITOR
HIGHDetects unexpected connections to the OpenClaw gateway daemon. Legitimate clients are known; any unknown connection is a probe or exploit attempt.
OPENCLAW SKILLS MONITOR
MEDIUMMonitors the skills directory for unauthorized modifications or new skill installations. Supply chain attacks against ClawHub skills begin here.
These alarms deploy on install and require no manual configuration. You can add additional alarms from the dashboard at any time. OpenClaw Shield Free includes up to 500 security events per month. See OpenClaw Shield pricing for paid plan limits and overage rates.
ALL ALARM TYPES
LLM API KEY
CREDENTIAL TRAPA fake LLM provider API key that looks identical to a real one.
Any attempt to authenticate to an LLM provider using the alarm key triggers an alert. Covers direct API calls, agents reading credentials from .env files or context windows, and automated tooling that sweeps for usable keys.
Infra Shield generates a key that matches the format of real provider keys (OpenAI, Anthropic, etc.). Place it in your .env file, agent configuration, or any location where real credentials live. The alarm is registered against Infra Shield's intercept endpoint before it can be used.
CRYPTO WALLET
FINANCIAL TRIPWIREA decoy cryptocurrency wallet address monitored for any transaction attempt.
Any on-chain interaction with the wallet address triggers an alert, including transfer attempts, contract calls, or balance checks from non-whitelisted addresses. Useful for detecting agents or attackers attempting to exfiltrate funds.
Infra Shield provides a monitored wallet address on your chosen chain (Ethereum, Solana, or Bitcoin). Include the address in agent tool configurations, smart contract whitelists, or anywhere a legitimate wallet address might appear in your infrastructure.
DATABASE HONEYPOT
INFRASTRUCTURE TRAPFake database credentials that trigger an alert on any connection attempt.
Any connection attempt using the decoy credentials triggers an alert, including automated credential stuffing, lateral movement by a compromised agent, or an attacker who has read your database configuration.
Infra Shield provides a set of fake database credentials (host, port, user, password, database name). Add them to your .env file, secrets manager, or any configuration file alongside real credentials. Infra Shield listens for connection attempts on the specified endpoint.
ENV FILE
FILE MONITORA monitored .env file that triggers an alert on any unauthorized read.
File read events on the monitored path trigger an alert. This catches agents or processes that scan the filesystem for credential files, as well as attackers who have gained code execution and are searching for secrets.
Infra Shield's agent installs a filesystem watcher on the path you specify. Place a realistic-looking .env file at that path. Any process that opens it for reading generates an alert with the process name, PID, and user.
PORT LISTENER
NETWORK SENSORA network port listener that triggers an alert on any inbound connection attempt.
Any TCP or UDP connection attempt to the monitored port triggers an alert, enriched with GeoIP data, ASN, and reverse DNS. Useful for detecting network probes, lateral movement, and unauthorized port scanning.
Choose a port that should never receive legitimate traffic in your environment. Infra Shield's agent opens a listener on that port. You can also deploy listeners on well-known ports like 22 (SSH), 3306 (MySQL), or 5432 (PostgreSQL) by using the agent's port mirroring mode, which does not interfere with existing services.
SSH KEY
CREDENTIAL TRAPA fake SSH private key that triggers an alert when used for authentication.
Any SSH authentication attempt using the decoy key triggers an alert with the source IP, port, username, and key fingerprint. Catches attackers who have found a private key and are attempting to use it for lateral movement.
Infra Shield generates a private key and registers the corresponding public key against a monitored endpoint. Place the private key in ~/.ssh/, agent configurations, or any location where SSH keys are typically stored. The key is cryptographically valid and will authenticate, triggering the alert on first use.
MCP TOOL
AGENT TRIPWIREA decoy MCP tool that triggers an alert when invoked by an agent.
Any agent invocation of the decoy tool triggers an alert, including the full tool call context: arguments, calling agent identity, and session information. This is particularly effective for detecting prompt injection attacks where a malicious instruction directs an agent to call a specific tool.
Infra Shield registers a decoy MCP tool under a name of your choosing. Add it to your MCP server configuration so agents can see it. Give it a plausible name that a malicious prompt might target (for example, a tool that appears to exfiltrate data or bypass a restriction). Any agent that invokes it triggers an alert.
GET STARTED
A free Infra Shield account includes 3 alarms. Deploy your first alarm in 3-5 minutes from the Infra Shield dashboard. No agent installation required for most alarm types.