Privacy & Security
ClawPaw’s architecture is structured around local-first execution and bounded authority. Operating at the OS level requires clarity about data handling and system access.
Local by Default
ClawPaw runs on your machine. Files and contextual data remain within your operating system environment. There is no hidden virtual desktop or remote mirror of your session.
Explicit Permissions
All system access is governed by macOS privacy controls. ClawPaw cannot:
- Bypass permission prompts
- Access unapproved folders
- Escalate privileges
You retain authority over:
- Microphone access
- Calendar integration
- Folder scope
Sandbox-Prioritized Execution
Where possible, actions run in constrained environments. This reduces risk surface and prevents uncontrolled background behavior.
Execution remains:
- Mode-bound
- Permission-bound
- Scope-bound
No Surveillance Model
ClawPaw does not monetize user behavior. It does not build advertising profiles or sell usage data. Persistent memory remains local and structured.
Intelligence is applied to assist your work — not to extract value from your activity.
Structural Trust
Trust is not established through marketing claims but through architectural constraints.
ClawPaw’s design separates:
- Cognition from authority
- Context from surveillance
- Power from escalation
Operating at the system level requires restraint. ClawPaw is structured around it.
