By ArmorerLabs
Operate Armorer-managed applications via unified CLI to install, uninstall, run, configure, inspect state, monitor jobs, queues, logs, and verify runtime health, replacing ad-hoc shell commands.
npx claudepluginhub armorerlabs/armorer
Run any agent. Securely.
Website · Install · Docs for humans · Issues
Armorer is the local control plane for running AI agents with sandboxes, approvals, guardrails, credentials, logs, and runtime health in one place.
Star ArmorerLabs/Armorer if you want safer local agent runtimes to exist.
curl -fsSL https://armorerlabs.com/install | sh
Then open the local UI and install agents like OpenClaw through Armorer.
Set up Armorer from https://github.com/ArmorerLabs/Armorer on this machine.
Follow AGENTS.md and the repository instructions.
Install Armorer, verify Docker, start the local UI, then help me install and configure OpenClaw through Armorer.
Do not report success until the Armorer CLI works, the UI is reachable, and runtime health checks pass.
| Running agents directly | Running agents through Armorer Labs |
|---|---|
| Each agent has its own setup path | One local control plane |
| Credentials are easy to scatter | Guided credential handling |
| Risky actions are hard to review | Human approvals and guardrails |
| Logs live wherever the agent puts them | Jobs, runtime status, and audit trails |
| Local networking gets messy | Local-first with optional private remote access |
Prefer doing it yourself instead of handing the repo to an agent?
Start here: HUMANS.md
Armorer Labs is not another model provider. It is not a hosted agent platform. It is a self-hosted, local-first agent runtime layer for builders who want control, sandboxing, and security posture before they scale agent usage.
APort Agent Guardrails — security policy enforcement for every tool call. Intercepts tool use, evaluates against your passport policy, and blocks unauthorized actions.
GoPlus AgentGuard — AI agent security guard. Blocks dangerous commands, prevents data leaks, protects secrets. 20 detection rules, runtime action evaluation, trust registry.
Security controls for AI agents — deterministic policy enforcement, OWASP ASI10 scanning, and audit trails.
Runtime security enforcement for AI coding agents — policy hooks, audit receipts, threat hunting, and security tools for Claude Code.
Security-enhanced MCP proxy. Proxies all plugin MCP servers through a unified security layer. Block destructive tool calls, audit operations, and recover configs with /armour commands.
Share bugs, ideas, or general feedback.
Security guardrails - credential protection, destructive command blocking, write scope enforcement, supply chain control, browser restrictions
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claim