Autonomous Security Cognition — On 0G Network

RAXCLAW

Persistent autonomous security cognition.
Replayable intelligence that evolves with every audit.

OpenClaw · RAXC · 0G Compute · 0G Storage · ERC-7857 · ERC-8183

Download Runtime ↓View Audit ExplorerGitHub ↗
3 audits persisted
14 memories loaded
ERC-7857 live

Audit Intelligence Pipeline

Every audit flows through a deterministic pipeline
from exploit pattern matching to permanent cognition storage on 0G.

OpenClaw
Orchestration Layer
Orchestrates exploit pattern detection pipeline across all agent tools
RAXC
Autonomous Agent
Multi-tool agentic execution with deterministic consensus
0G Compute
Deterministic Exec
Sovereign off-chain execution with verifiable output
0G Storage
Exploit & Audit Store
Stores exploit patterns, audit reports, and cognition replay traces on-chain
ERC-7857
Identity Update
On-chain agent identity evolves with each cognition cycle
ERC-8183
Audit Task Proof
Creates and finalizes audit task on-chain with cryptographic proof

Cognition Metrics

Live infrastructure metrics from the RAXCLAW autonomous execution runtime.

3
Audits Completed
ERC-8183 finalized tasks
3
Root Hashes Stored
on 0G network
14
Historical Memories
cognition entries loaded
3
ERC-7857 Updates
identity mutations on-chain
722
Exploit Patterns
in 0g storage

Cognition History

Live audit records from the ERC-8183 contract on 0G Galileo.
Click any row to view the full security report stored on 0G Storage.

Fetching audit tasks from 0G Galileo…

Autonomous
Execution

RAXCLAW runs entirely from the command line

Every audit is deterministic and cryptographically verifiable

The frontend only replays what the terminal already proved

raxclaw — zsh

Growing Cognition

Each audit accumulates in long-context memory.
The agent learns from every execution building persistent intelligence over time that improves future analyses.

Loading…
Fetching from chain…

Runtime Installation

RAXCLAW runs locally from the terminal. The frontend is only a replay and verification interface — the runtime is the primary product.

📦
Prerequisites
Node.js 18+ · Rust · pnpm
git clone https://github.com/JFKongphop/raxc-0g-agent-framework
or: cd raxc-0g-agent-framework
⚙️
Build
JS CLI + Rust binary · one-time
pnpm install && pnpm build:all
or: builds dist/raxclaw + prebuilt Rust binary
🚀
Run
no .env setup needed
./dist/raxclaw run
or: ./dist/raxclaw run --file MyContract.sol
Quick Start
$ git clone https://github.com/JFKongphop/raxc-0g-agent-framework
$ cd raxc-0g-agent-framework && pnpm install && pnpm build:all
$ ./dist/raxclaw run
$ ./dist/raxclaw run --file MyContract.sol
$ ./dist/raxclaw list
$ ./dist/raxclaw show <report>
DemoVault.sol — inline audit
⚠ reentrancy · flash loan · access control
$./dist/raxclaw run "<contract code>"
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.0;

contract DemoVault {
    address public owner;
    mapping(address => uint256) public balances;
    uint256 public totalDeposits;
    uint256 public flashLoanFee = 10;

    constructor() { owner = msg.sender; }

    // ⚠ CEI violation — state updated AFTER external call
    function withdraw(uint256 amount) external {
        require(balances[msg.sender] >= amount, "insufficient balance");
        (bool ok, ) = msg.sender.call{value: amount}("");
        require(ok, "transfer failed");
        balances[msg.sender] -= amount;   // ← runs AFTER call
    }

    // ⚠ flash loan — spot balance as oracle reference
    function flashLoan(uint256 amount) external {
        uint256 balanceBefore = address(this).balance;
        (bool ok, ) = msg.sender.call{value: amount}(...);
    }

    // ⚠ no access control — anyone can call setFee
    function setFee(uint256 newFee) external {
        flashLoanFee = newFee;
    }
}
View on GitHub ↗Documentation