ClawArm controls real robotic hardware that can cause injury or property damage.
- Clear the workspace before any arm movement. Ensure no people or obstacles are within the arm's reach envelope.
- Start with low speed (
set_speed_percent(30)) when testing new motions. Increase only after verifying the trajectory. - Keep the physical emergency stop within reach at all times.
- Never disable the safety layer (
safetyEnabled: true) in production environments. - Test in mock mode first (
CLAWARM_MOCK=true) before running against real hardware.
- Bridge API:
POST /stopwith{"action": "emergency_stop"} - OpenClaw tool: The agent can call
arm_stopwith actionemergency_stop - Physical button: Always preferred — use the hardware E-stop on the arm controller
- Software kill:
Ctrl+Cthe bridge server process to cut all communication
If you discover a security vulnerability, please report it responsibly:
- Do NOT open a public GitHub issue
- Email security@clawland.ai with details
- Include steps to reproduce and potential impact
- We will respond within 48 hours
- The bridge server binds to
127.0.0.1by default (localhost only) - No authentication is required for local connections by design
- If exposing the bridge to a network, use a reverse proxy with authentication
- The OpenClaw plugin communicates with the bridge over HTTP — do not expose port 8420 to the internet
- Pin all Python dependencies in
pyproject.toml - Run
pip auditregularly to check for known vulnerabilities - Keep pyAgxArm updated to the latest stable release