Universal adapters
Collect from OpenClaw, macOS, Linux, and Windows with a shared adapter model and normalize events into one schema that is easier to reason about.
SecOpsAI unifies telemetry from OpenClaw, macOS, Linux, and Windows, detects threats, correlates findings across systems, and keeps analyst workflows grounded in a local SOC store instead of a remote control plane.
SecOpsAI keeps collection, correlation, triage, and policy decisions close to the operator. That makes the workflow easier to inspect, faster to iterate on, and a better fit for teams that care about local control over telemetry and analyst actions.
Collect from OpenClaw, macOS, Linux, and Windows with a shared adapter model and normalize events into one schema that is easier to reason about.
Correlate findings by IP, user, time window, and file hash so attack patterns stand out even when the raw telemetry came from different systems.
Investigate findings, auto-close low-risk cases, queue higher-risk analyst actions, and keep the review trail in your local SOC store.
Tune supply-chain thresholds, rules, and allowlists locally instead of depending on a remote service to approve the last mile of security decisions.
OpenClaw and macOS are production-ready today, while Linux and Windows adapters are in active beta. The support matrix keeps deployment posture obvious at a glance without dropping users into documentation too early.
Bring back the fast install paths without bringing back the clutter. The one-liner stays front and center, npm remains available, the manual path is hackable, and Windows keeps a clear beta lane.
One-liner
Use the bootstrap script when you want the fastest local path from zero to SecOpsAI on a fresh machine.
macOS is the smoothest path today. Windows teams can use the same installer from WSL2.