Enterprise-grade detection scripts for shadow AI and unauthorized software installations
Open Threat Detector is an open-source framework for detecting unauthorized AI tools and shadow IT installations across enterprise environments. Deploy via MDM/EDR platforms to maintain organizational compliance, security posture, and prevent data exfiltration through unmanaged AI services.
Shadow AI refers to unauthorized AI tools and services used within organizations without IT department approval or oversight. These tools pose significant risks:
- Data Leakage: Sensitive data uploaded to uncontrolled AI services
- Compliance Violations: GDPR, HIPAA, SOC2 violations
- IP Theft: Proprietary code and information shared externally
- Security Gaps: Unvetted tools bypass security controls
- Audit Failures: Untracked AI usage creates compliance blind spots
| Tool | Status | Windows | macOS | Linux | Description |
|---|---|---|---|---|---|
| OpenClaw | β Ready | β | β | β | Detection of Unsecure AI assitant detection |
Want to add a detector? See Adding New Detectors
git clone https://github.com/yourusername/open-threat-detector.git
cd open-threat-detectorNavigate to the specific detector you want to deploy:
cd detectors/openclawOption A: Direct Execution
# Unix/macOS/Linux
./unix/detect-openclaw.sh --verbose
# Windows (PowerShell)
.\windows\Detect-OpenClaw.ps1 -VerboseOption B: MDM Deployment
See Deployment Guide for platform-specific instructions:
All detectors follow a standardized exit code convention:
- 0 = Software NOT detected (Compliant β )
- 1 = Software DETECTED (Non-Compliant β)
- 2 = Execution Error (Investigation Required
β οΈ )
This standardization enables consistent reporting across all MDM/EDR platforms.
open-threat-detector/
βββ detectors/ # Individual threat detectors
β βββ openclaw/ # OpenClaw AI detection
β βββ template/ # Template for new detectors
β βββ [future-tools]/ # Additional detectors
βββ docs/ # Documentation
β βββ deployment/ # Platform-specific guides
β βββ DEPLOYMENT.md # General deployment guide
β βββ CONTRIBUTING.md # Contribution guidelines
β βββ adding-detectors.md # How to add new detectors
βββ examples/ # Configuration examples
β βββ mdm-configs/ # MDM platform configs
β βββ reporting/ # Reporting scripts
βββ tools/ # Common utilities
Each detector performs comprehensive checks:
These checks determine compliance status (affect exit code):
- Binary/Executable Detection - Searches system PATH and common install locations
- Configuration Files - Identifies application settings and state files
- Active Services - Detects running services and daemons
- Network Ports - Probes for listening services on known ports
- Container Artifacts - Scans Docker images and containers
- Registry Entries (Windows) - Checks installation registry keys
- Application Bundles (macOS) - Identifies .app bundles
- Package Managers - Checks installed packages
Additional context (informational only):
- Active processes
- Environment variables
- Shell configuration files
- User-specific installations
Deploy detectors via your existing infrastructure:
- Microsoft Intune
- Jamf Pro
- Kandji
- JumpCloud
- VMware Workspace ONE
- CrowdStrike Falcon
- SentinelOne
- Microsoft Defender
- Carbon Black
- Scheduled Tasks (Windows)
- Cron Jobs (Linux/macOS)
- SystemD Services (Linux)
- CI/CD Pipelines
See Deployment Documentation for detailed guides.
Generate compliance reports across your fleet:
# Example: Generate compliance report
python examples/reporting/compliance-report.py \
--input detection-results.csv \
--output report.pdf \
--format executiveReports include:
- Executive summary with compliance percentages
- Detailed findings by device and detector
- Trend analysis and historical data
- Remediation recommendations
- Read-Only Operations: Scripts only detect, never modify systems
- No Data Transmission: All processing happens locally
- No Telemetry: Scripts don't send data externally
- Open Source: Full transparency, audit the code yourself
- Minimal Privileges: Runs with standard user permissions
- Safe at Scale: Tested for enterprise deployment
We welcome contributions! Here's how you can help:
- Add New Detectors: Contribute detection scripts for additional AI tools
- Improve Existing Detectors: Enhance detection accuracy and coverage
- Documentation: Improve guides and documentation
- Platform Support: Add MDM/EDR platform integrations
- Bug Fixes: Report and fix issues
See Contributing Guide for details.
We've made it easy to add new detectors:
- Copy the template:
cp -r detectors/template detectors/your-tool - Customize detection logic for your target software
- Add tests and documentation
- Submit a pull request
Full guide: Adding New Detectors
- Deployment Guide - Deploy scripts via MDM/EDR
- Contributing Guide - Development guidelines
- Adding Detectors - Create new detectors
- Architecture - System design and patterns
- Detect unauthorized AI tools across the organization
- Enforce acceptable use policies
- Maintain compliance with data protection regulations
- Prevent data exfiltration through unmanaged services
- Track shadow IT adoption
- Manage software licenses and compliance
- Audit installed applications
- Generate compliance reports for stakeholders
- Demonstrate control over AI tool usage
- Audit trail for regulatory requirements
- Risk assessment and mitigation
- Policy enforcement verification
Q: Will these scripts remove detected software? A: No. Scripts are detection-only and read-only. They never modify or remove software.
Q: Do scripts require admin/root privileges? A: Most checks work with standard user permissions. Some system-wide checks may require elevation.
Q: How often should I run detection scripts? A: Daily or weekly scans are typical. Critical environments may run more frequently.
Q: Can I customize detection logic? A: Yes! All scripts are open source and customizable. See each detector's README.
Q: What data is collected? A: Only detection status (found/not found) and locations. No user data is collected.
Q: How accurate are the detections? A: Detectors use multiple verification methods to minimize false positives/negatives.
This project is licensed under the MIT License - see the LICENSE file for details.
- Community contributors who add and maintain detectors
- Security researchers identifying shadow AI risks
- Enterprise IT teams providing real-world feedback
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Security: See SECURITY.md for reporting vulnerabilities
Made with β€οΈ by the security minded engineers
Protecting organizations from shadow AI risks through open-source detection