Version: v1.1.0
This page is a neutral comparison for clarity. It does not change TealTiger v1.1.0 contracts.
OpenClaw Hardening Tools vs TealTiger Governance
Summary
Agent ecosystems often have two types of defenses:- Hardening tools (security): audit and lock down the agent environment.
- Governance layers (TealTiger): evaluate actions against deterministic policy and emit audit evidence.
What hardening tools typically do
Hardening tools typically focus on:- configuration audits (detect risky settings)
- automated remediation (apply safer defaults)
- network hardening (local-only bindings, TLS)
- credential scanning and hygiene
- supply chain checks for skills/plugins
What TealTiger adds
TealTiger adds a deterministic decision boundary for actions:- policy-driven allow/deny/transform/degrade/redact decisions
- stable reason codes for explainability
- risk scores to quantify signals
- audit events as evidence
- rollout modes (report-only/monitor/enforce)
Practical architecture (recommended)
Hardening reduces attack surface. TealTiger governs what actions are allowed and records evidence.
When you should use which
- If you’re worried about exposed ports, weak auth, or compromised plugins → start with hardening.
- If you’re worried about runaway spend, data movement, or policy compliance → add TealTiger governance.
Related reading
- /concepts/security-vs-governance
- /integrations/openclaw
- /concepts/decision-model
- /audit/audit-event-schema

