
I Gave My AI Agent Shell Access. Here's Every Command It Ran
Last month I did something reckless. I gave an AI agent — a persistent, autonomous Claude instance running via OpenClaw — full shell access on my Linux workstation. bash , unrestricted. It could read my files, run commands, install packages, curl anything. Then I watched everything it did. I used ClawMoat 's HostGuardian and audit logging to monitor every single action. What I found was equal parts fascinating and terrifying. The Setup My agent runs 24/7 on a dedicated Linux box. It handles tasks I give it via Discord: writing code, managing repos, drafting emails, researching topics. Standard AI-agent-with-tools stuff. Here's how I wired up the monitoring: npm install -g clawmoat # Start the guardian in daemon mode clawmoat watch --daemon --alert-webhook = https://my-slack-webhook.url And in the agent's runtime config: import { HostGuardian } from ' clawmoat ' ; const guardian = new HostGuardian ({ tier : ' standard ' , forbiddenZones : ' default ' , auditLog : true }); For full host
Continue reading on Dev.to DevOps
Opens in a new tab



