
Autonomous penetration testing with AI agents – self-hosted, compliance-ready, and fully under your control. Powered by Claude, NVIDIA NemoClaw, and OpenClaw.
SentinelClaw is a self-hosted platform for authorized security assessments. AI agents plan and execute multi-phase penetration tests autonomously – with strict sandbox isolation, kill switch, and complete audit trails. No vendor lock-in, full data sovereignty.
Orchestrator agent coordinates specialized scan agents. Autonomous decision-making with tool loops and error recovery.
From auth & RBAC through Docker sandbox to kernel-level isolation with Landlock LSM and seccomp BPF.
Instant emergency stop via application, container, network, and OS level – independently of each other.
Built for GDPR, BSI Grundschutz, and ISO 27001. PDF reports with legal authorization proof.
4-phase pipeline: host discovery, port scan, vulnerability scan, and AI-powered analysis with nmap and nuclei.
3-tier LLM strategy: Ollama (self-hosted), Azure OpenAI (EU), or Claude API. You decide where your data stays.
Network reconnaissance and reachability check of target systems.
Service identification and version detection on open ports.
Automated vulnerability assessment with nuclei templates.
Evaluation, prioritization, and report generation by AI agents.
Python 3.12+, FastAPI, SQLAlchemy, structlog
React 19, TypeScript, Tailwind CSS, Vite
Docker, Landlock LSM, seccomp BPF, NemoClaw
Claude API, Azure OpenAI, Ollama
nmap 7.80, nuclei 3.3.7, MCP Server
SentinelClaw is open source and can be set up in minutes.
Clone the repository
git clone https://github.com/antonio-030/SentinalClaw.gitInstall dependencies & configure .env
pip install -e . && cp .env.example .envStart Docker sandbox and get going
docker compose up -d sandbox