Authentication

ClawFirst implements defense-in-depth security architecture designed specifically for autonomous agent operation. This document covers the non-custodial signing service, approval policy engine, and security best practices.

Security Architecture

ClawFirst separates agent operation from private key access using a three-layer security model:

┌─────────────────────────────────────────────────────────────┐
│                     Agent Layer                              │
│  • Natural language processing                               │
│  • Payment intent extraction                                 │
│  • NO access to private keys                                 │
└────────────────────────┬────────────────────────────────────┘
                         │ MCP Tool Calls
                         │ (No cryptographic material)

┌─────────────────────────────────────────────────────────────┐
│                   Approval Layer                             │
│  • Policy evaluation                                         │
│  • Multi-tier authorization                                  │
│  • Spending limit enforcement                                │
└────────────────────────┬────────────────────────────────────┘
                         │ Approved Transactions
                         │ (Policy-validated)

┌─────────────────────────────────────────────────────────────┐
│                   Signing Layer (HSM)                        │
│  • Hardware-isolated private keys                            │
│  • Cryptographic signing operations                          │
│  • Never exposes keys to MCP server                          │
└─────────────────────────────────────────────────────────────┘

Non-Custodial Signing Service

Private keys never enter the ClawFirst MCP server memory space. All signing operations execute in isolated hardware security modules (HSM) or key management services.

HSM Integration

Production Key Management

AWS KMS Integration:

Google Cloud KMS Integration:

HashiCorp Vault Integration:

Approval Policy Engine

The approval policy engine enforces spending controls before transactions reach the signing service.

Multi-Tier Approval Workflow

Policy Evaluation

Circuit Breakers

Automatic suspension of agents exhibiting anomalous behavior:

Circuit Breaker States:

  • CLOSED - Normal operation

  • OPEN - Agent suspended, all transactions blocked

  • HALF_OPEN - Testing recovery, limited transactions allowed

Audit Logging

All payment operations are logged with immutable audit trails:

Example Log Entry:

MCP Server Authentication

Agents authenticate to the ClawFirst MCP server using one of three methods:

1. Mutual TLS (mTLS)

2. JWT Tokens

3. API Keys

Security Best Practices

1. Never Expose Keys to Agents

2. Implement Approval Policies

3. Enable Audit Logging

4. Monitor for Anomalies

Set up alerting for suspicious patterns:

5. Network Segmentation

Incident Response

Manual Override

Immediately suspend all agent transactions:

Recovery Procedures

  1. Identify Incident - Review audit logs and transaction history

  2. Suspend Agent - Emergency suspend command

  3. Investigate - Analyze anomalous behavior patterns

  4. Rotate Credentials - Generate new delegation tokens

  5. Resume Operations - Gradually reactivate with increased monitoring

Next Steps

Last updated