How Siclaw Investigates
Siclaw’s core is a 4-phase hypothesis-driven investigation engine:Runtime Modes
Siclaw runs in three modes sharing one agent core:| Mode | Use Case | Start Command |
|---|---|---|
| CLI (TUI) | Personal terminal diagnostics | npx siclaw |
| Gateway | Multi-user with Web UI, Slack, Lark | siclaw-gateway |
| Cron | Scheduled health patrols | siclaw-cron |
Skills
Skills are reusable diagnostic playbooks your team can create and share:SKILL.md description and optional scripts (.sh, .py). Scripts go through mandatory security review (static analysis + AI review + human approval) before they can execute.
See Skills for details.
Investigation Memory
Siclaw learns from every investigation:- Stores structured records (root cause, causal chain, confidence) in a local database
- Hybrid search (vector similarity + keyword matching) retrieves relevant past incidents
- Past findings feed into Phase 2 to improve hypothesis generation
Security Model
Siclaw uses a whitelist-only security model — commands must be explicitly approved to run:- Shell: ~80 approved binaries only.
sed,awk,ncare intentionally excluded. - kubectl: Read-only (13 safe subcommands). All write operations permanently blocked.
- Skills: Scripts exempt from the binary allowlist, but require the security review gate.
- Files: Agent can only write to its own data directory.