Manifesto
Modern threats move across OpenClaw, macOS, Linux, and Windows. These docs are organized around the workflows that close the gap: collection, correlation, triage, and human review.
Core guides
Open the docs like an operator console.
Start with the install path, move into investigation workflows, and keep the deployment and API references nearby as you scale out.
Getting Started
Install SecOpsAI, activate the virtual environment, and run the first local pipeline.
Guide 02Findings Triage Guide
Work through finding states, review decisions, and disposition outcomes with a repeatable analyst flow.
Guide 03Triage Orchestrator
Learn how queued actions, search roots, and human review connect inside the native CLI workflow.
Guide 04Operator Runbook
Keep the day-to-day command surface nearby, from refresh and correlate through list, show, mitigate, and intel workflows.
Guide 05Threat Intel
Understand IOC ingestion, matching behavior, and the operational meaning of stale intel or telemetry.
Guide 06API Reference
Jump straight to command surfaces, programmatic touchpoints, and integration details.
Capabilities
The stack behind the docs.
These guides map to the core operating surfaces in SecOpsAI, so you can move from first install to mature operations without changing mental models.
Collect everywhere
Bring OpenClaw and host telemetry into one local-first pipeline.
Investigate clearly
Move findings through review with explainable operator steps and queued actions.
Operate and deploy
Wire policy, rules, deployment, and APIs into a production-ready workflow.
Quick Start
Deploy in minutes.
Install the environment, refresh telemetry, correlate findings, and run triage from one straightforward command flow.
# Install and initialize
curl -fsSL https://secopsai.dev/install.sh | bash
cd ~/secopsai
source .venv/bin/activate
secopsai refresh
secopsai refresh --platform macos,openclaw
secopsai correlate
secopsai triage orchestrate --search-root ~/secopsai
OpenClaw
Primary native telemetry integration and reference workflow.
macOS
Host telemetry collection and local findings generation.
Linux
Ready for deployment with journalctl and auditd-backed sources.
Windows
Ready for deployment with Event Logs and Sysmon workflows.