ClawStaff

Access Controls & Whitelisting

Control exactly who can reach your AI agents

Most AI agent platforms treat access control as an afterthought. You deploy a bot, it joins a channel, and anyone who can type a message can interact with it. Anyone who can interact with it can extract whatever information it has access to. This is a fundamental security problem that no amount of prompt engineering can solve. If your AI agent has access to your company’s Google Drive, Jira tickets, and GitHub repos, then anyone who can message that agent can potentially get that agent to share sensitive data.

ClawStaff takes a different approach. Every Claw has channel-level whitelisting that controls exactly who can communicate with it, across every connected integration. Combined with three Claw scoping levels (private, team, and organization-wide) you get fine-grained control over who interacts with your AI agents and what data they can access through them.

The Problem: Uncontrolled Agent Access

When you deploy an AI agent connected to your company’s tools, you create a new attack surface. The agent has access to data (emails, documents, code, tickets) and it can be instructed to retrieve, summarize, or share that data through conversation. Without access controls:

  • Anyone in a Slack workspace can message your bot and ask it to share information from connected tools, even if they should not have access to that data.
  • External users in shared channels can interact with your agent and potentially extract internal information.
  • Departing employees retain access to the agent until someone manually removes them.
  • Social engineering attacks become trivial. Just message the bot with the right question.

The risk is not theoretical. If your Claw has access to Gmail, Drive, and Jira, and anyone in your Slack workspace can talk to it, you have effectively given every Slack user access to those systems through a conversational interface, regardless of whether they have direct access to those tools.

Channel-Level Whitelisting

ClawStaff solves this with channel-level whitelisting. For every integration your Claw connects to, you define exactly who can interact with it through that channel:

Slack: Whitelist specific users, channels, or Slack user groups. A Claw in a Slack workspace can be restricted to only respond to messages from @alice and @bob, or only in the #engineering channel, or only from members of the @frontend-team user group. Messages from anyone else are ignored.

Microsoft Teams: Whitelist specific users, channels, or Teams groups. IT admins can further restrict access using standard Teams app permission policies. A Claw can be limited to the Engineering team or specific channels.

Gmail: Whitelist email addresses, domains, or distribution lists. A Claw processing a shared inbox can be restricted to only handle emails from @company.com addresses, or only from specific partner domains. External spam or cold outreach never reaches the Claw.

Google Chat: Whitelist specific users or Chat spaces. A Claw only responds in the whitelisted spaces and ignores direct messages from unlisted users.

Discord: Whitelist users, roles, or channels. A Claw in a Discord server can be restricted to only respond to users with the @Staff role, or only in the #support channel.

Telegram: Whitelist specific users or groups. A Claw only processes messages from whitelisted Telegram accounts or group chats.

WhatsApp: Whitelist phone numbers or groups. Only messages from whitelisted numbers reach the Claw.

GitHub: Access is scoped through the personal access token. The PAT defines which repositories and permissions the Claw has. Only repos explicitly granted in the token are accessible.

Notion: Access is scoped through the OAuth flow. Only pages and databases explicitly shared with the integration during authorization are accessible.

Atlassian (Jira & Confluence): Access is scoped per project and space during OAuth authorization. A Claw authorized for the ENG project cannot access the HR project.

Three Claw Scoping Levels

Beyond per-channel whitelisting, every Claw is deployed at one of three scoping levels that define its accessibility within your organization:

Private Claw

Only the creator can interact with the Claw. This is a personal AI assistant that reads your email, manages your calendar, organizes your files, and responds only to you. Nobody else in the organization can message it, trigger it, or see its outputs.

Use cases:

  • Personal inbox triage assistant (Gmail + Slack DM)
  • Individual coding assistant (GitHub + Slack DM, whitelisted to one user)
  • Personal meeting prep bot (Calendar + Docs + Slack DM)

Security benefit: Zero risk of data leakage through the agent. Since only one person can interact, there is no attack surface for social engineering or unauthorized access through the conversational interface.

Team Claw

Whitelisted team members can interact with the Claw. It serves a specific team but is invisible to the rest of the organization. Team membership is defined through whitelisting: by Slack user group, Teams group, email domain, or explicit user list.

Use cases:

  • Engineering bug triage bot (#engineering channel, whitelisted to engineering Slack group)
  • Support team email processor (shared Gmail inbox, whitelisted to support team)
  • Product team research assistant (Notion + Jira, whitelisted to product team members)

Security benefit: Data accessed by the team Claw stays within the team. An employee from marketing cannot message the engineering team’s bug triage bot and extract information about unreleased features or security vulnerabilities.

Organization-wide Claw

Any member of the organization can interact. The Claw serves as a company-wide resource: an HR policy bot, a knowledge search assistant, or an onboarding helper. Still whitelisted to the company domain or organizational identity, so external users cannot interact.

Use cases:

  • Company-wide knowledge bot (Slack, whitelisted to @company.com members)
  • HR policy assistant (Google Chat, whitelisted to organizational accounts)
  • IT help desk (Teams, available to all org members through standard channel)

Security benefit: While accessible to everyone internally, the Claw is still whitelisted to the organization. External users, contractors on separate domains, or anyone outside the whitelist cannot interact.

How It Works Together

Whitelisting and scoping work as independent layers. A Team Claw connected to Slack and Gmail might have:

  • Slack whitelisting: Only messages from #support-team channel
  • Gmail whitelisting: Only emails from @company.com domain
  • Claw scope: Team (only whitelisted support team members can configure or query the Claw)

This means the Claw processes emails only from company addresses, responds only in the support team’s channel, and only support team members can interact with it. Three layers of access control, each independently configured.

Why It Matters

Channel-level whitelisting and Claw scoping are not optional security features. They are the foundation that makes multi-agent deployment safe for organizations handling sensitive data.

  • Prevents data leakage. An agent with access to confidential HR data cannot be tricked into sharing it with unauthorized employees, because unauthorized employees cannot talk to it.
  • Stops social engineering through agents. The primary attack vector against AI agents is conversational: asking the right questions to extract information. Whitelisting eliminates this vector entirely for users outside the whitelist.
  • Enables personal AI assistants. Employees want personal AI assistants but fear that others might message their bot and extract sensitive data. Private Claws solve this completely.
  • Supports compliance requirements. Regulated industries need documented access controls. Whitelisting provides a clear, auditable record of who can interact with each agent and through which channels.
  • Scales with your organization. As you deploy more Claws across more teams, whitelisting ensures that each agent’s access boundary is independently defined and enforced, preventing the access sprawl that comes with shared-runtime platforms.

Combined with ClawCage container isolation, access controls and whitelisting give you a zero-trust architecture for AI agent deployment where every agent is isolated at the infrastructure level and access-controlled at the communication level.

These same scoping levels also serve as knowledge boundaries for agent memory. A private Claw’s accumulated context stays private. A team Claw shares knowledge within its team. Access controls determine not just who can talk to an agent, but what that agent knows. Learn more in Shared Memory in Multi-Agent Systems.

Ready to get started?

Deploy AI agents that work across your team's tools.

Join the Waitlist