LionClaw v0 proves the core product: a real agent CLI, running locally under a controlled boundary, with durable sessions, visible continuity, channels, scheduled jobs, and auditable kernel decisions.
LionClaw v0 is a secure-first local Claw.
It:
- runs selected agent CLIs through
lionclaw run [runtime], - compiles and enforces runtime execution plans,
- keeps durable LionClaw sessions and turn history,
- projects assistant identity, continuity, and selected skill context into the runtime,
- supports Codex and OpenCode as program-backed runtimes,
- treats channels as external skill workers,
- runs time-based jobs in isolated scheduler sessions,
- records audit events for kernel-owned decisions and boundary crossings.
LionClaw v0 is not a new full assistant harness.
It does not:
- reimplement Codex, OpenCode, Claude, or Gemini tool loops,
- mediate every internal tool call made by a program-backed runtime,
- pretend prompt instructions are a security boundary,
- hide continuity in an opaque memory store,
- make raw HTTP the normal operator experience,
- bake Telegram, terminal UI, or any other external channel into the Rust core.
- Claws are a useful new layer above AI agents: persistence, channels, scheduling, context, and long-running presence.
- That layer is dangerous if it becomes a giant process with ambient access to the user's machine.
- The safer route is to run the real agent directly inside an explicit local boundary.
- LionClaw should be small enough to reason about, but capable enough to be useful every day.
lionclaw run [runtime]is the canonical interactive path.- The selected runtime does the agent work.
- LionClaw owns the boundary around that work.
- Security controls live in kernel code, runtime confinement, and policy.
- Prompt text can guide behavior; it cannot grant permission.
- Channels are skills and workers, not core transports.
- Runtime configuration lives in LionClaw state/config, not accidental shell PATH or session env.
- LionClaw-owned privileged actions and runtime boundary decisions are auditable.
- Harness-native actions are constrained by the runtime execution plan.
- The trusted core should stay small, explicit, and boring.
- Operator CLI for onboarding, runtime registration, local runs, service control, channels, jobs, and continuity.
- SQLite-backed kernel services for sessions, turns, skills, policy, audit, channels, jobs, and continuity metadata.
- Program-backed runtime path for Codex.
- Program-backed runtime path for OpenCode.
- Shared OCI runtime image and rootless Podman backend.
- Runtime execution planner with workspace, runtime, drafts, network, secrets, timeout, image, and compatibility decisions.
- Codex host-auth staging without mounting the real host Codex home into the runtime container.
- Channel bridge API for external channel skills.
- Terminal channel and Telegram channel skill paths.
- Scheduler for time-based jobs with fresh synthetic sessions and optional channel delivery.
- Visible assistant continuity under the assistant home workspace.
- Manual QA pass covering real Codex, real Podman confinement, service reuse, terminal channel flow, scheduler flow, runtime secrets, and project isolation.
Implemented v0 security model:
- Unix-only trusted filesystem assumptions.
- Runtime launches go through the shared execution planner.
- Confined runtimes see
/workspace,/runtime, and/drafts. - Runtime network mode is coarse:
onornone. - Runtime-visible secrets are mounted only when the selected preset allows it.
- The runtime secret file is hardened to owner-only permissions on Unix.
- Codex auth is staged into runtime-private state; the real host Codex home is not mounted into the container.
- Runtime idle timeout, hard timeout, and cancellation are kernel-enforced.
- Channel inbound is gated by pairing approval.
- Kernel-owned mutations and runtime boundary decisions are audited.
Deferred security hardening:
- precise egress allowlists,
- secret broker/proxy for non-runtime-visible credentials,
- signed skill supply chain,
- runtime image provenance checks,
- security audit CLI,
- alternative confinement backends,
- sandboxing for untrusted helper tools beyond the primary OCI runtime path.
In v0, a runtime may be:
- program-backed, where LionClaw launches a real agent CLI inside the execution plan; or
- direct, where the adapter can return explicit kernel-brokered capability requests.
Codex and OpenCode are program-backed runtimes. The direct path remains useful for tests and future narrow adapters, but it is not the main product path.
- Production-grade secret broker for all credentials.
- Full egress-control plane.
- Remote skill registry and signature enforcement.
- Multi-user hosted service.
- Windows support.
- Built-in external channels.
- Replacing the selected agent's native capabilities with a LionClaw tool broker.