Skip to main content

How Siclaw Investigates

Siclaw uses a 4-phase hypothesis-driven investigation engine: gather context → generate hypotheses → validate in parallel → produce a structured report with root cause and remediation. Every investigation is read-only — Siclaw never modifies your cluster. See Deep Investigation for the full workflow.

Runtime Modes

Siclaw runs in three modes sharing one agent core:
ModeUse CaseStart Command
CLI (TUI)Personal terminal diagnosticssiclaw
Local ServerTeam use with Web UI and shared configurationsiclaw local
KubernetesProduction multi-tenant deploymenthelm upgrade --install siclaw ./helm/siclaw ...
Use siclaw for personal terminal workflows, siclaw local for a browser-based local setup, and Kubernetes for team deployments.

Skills

Skills are reusable diagnostic playbooks your team can create, review, and share. See Skills for details.

Investigation Memory

Siclaw can reuse findings from previous incidents so recurring problems are recognized faster. See Memory for details.

Security Model

Siclaw is designed for read-only diagnostics. It investigates, explains, and recommends next steps without changing your environment directly.

MCP Integration

Siclaw supports the Model Context Protocol (MCP) for connecting external tools and data sources. See MCP Servers for setup and examples.