Keel

Keel

Persistent safety policies and cryptographic audit trails for tool-using agents. Keel keeps constraints on disk, not in the prompt. Policies survive context compaction. Every action is logged to a tamper-evident hash chain.

Local-first with optional Cloud sync
SHA-256 hash-chain WAL
Policies on disk, not in prompt
Deterministic policy evaluation

Install

# Install the Keel skill from ClawHub
clawhub install threshold-keel

# Keel loads automatically on session start.
# The SKILL.md instructs your agent to classify,
# approve, and log every tool action.

# If the CLI is installed, the agent uses it
# for real cryptographic hashing and deterministic
# policy checks. Without it, the agent follows
# the same rules using file tools directly.

Package not yet published to ClawHub. Coming soon. The SKILL.md can be installed manually by copying it to your OpenClaw skills directory.

Want Cloud sync? Set KEEL_CLOUD_API_KEY and the CLI handles routing automatically. See Cloud plans.

How it works

Keel operates in three modes, automatically selected. Instructions-only mode works with zero dependencies. The CLI adds cryptographic integrity. Cloud adds persistence and multi-agent coordination.

Instructions only (free, zero deps)

Tiered risk classification

Structured approval flows

Policy store on disk

WAL logging (plain text)

Blast radius caps

Context compaction survival

Cryptographic hash chains

Deterministic policy evaluation

Chain integrity verification

With CLI (free, pip install)

Everything in instructions mode

SHA-256 hash-chain WAL

Deterministic policy checking

Chain integrity verification

Fidelity self-checks

Structured JSON output

+ Cloud sync when KEEL_CLOUD_API_KEY is set. Dashboard, multi-agent coordination, compliance exports.

Core concepts

Policy store (persistent)
Rules live on disk or in Cloud, not in the prompt. Policies survive context compaction and session restarts. Deterministic evaluation when using the CLI.
WAL audit trail
Write-ahead log with SHA-256 hash chains. Append-only, tamper-evident. Every tool action, approval, and policy decision is recorded.
Tiered risk gating
Four tiers from read-only to irreversible. Each tier has its own approval requirements. The agent classifies before acting. Uncertainty defaults to the highest tier.
Structured approval
"Sure" and "go ahead" are not valid approvals. The human must demonstrate understanding of what will happen before Keel allows execution.

Risk tiers

T0 Read-only

Fetch email, list files, check calendar, web search. Logged but not gated.

T1 Reversible

Create files, add labels, make directories. Logged with notice.

T2 Reversible within window

Archive email, move to bin, relocate files. Requires brief approval. Quarantine period applies.

T3 Irreversible

Send email, permanent delete, publish, execute payment. Full structured approval. Policy-blockable.

Defaults are conservative. Policies can tighten or relax per tool, per target, per scope.

Why this exists

Tool-using agents are valuable because they can act. That is also the failure mode. In February 2026, 386 malicious skills were found on ClawHub. 30,000+ OpenClaw instances had no tool-call safety layer. Keel is a structural response: policy, approval, and audit at the boundary where actions happen.

Get started

Start local with the SKILL.md or CLI. Add Cloud when you want synced policies, a dashboard, and multi-agent coordination. Driftwatch and Helmsman integrate later for teams shipping agent workflows with evaluation gates and runtime confidence scoring.