What’s New
Release notes for the documentation and platform-facing behavior described on this site.
latest: v0.5.1 · February 19, 2026
v0.5.1 — February 19, 2026
Stability and compatibility
- Improved SQLite compatibility defaults in generated configs for runtimes where
node:sqliteis not available. - Documented fail-open-vs-fail-closed control with
store.requiredacross approval/rate/repetition stores. - Preserved backward compatibility for existing
v0.4.xconfigs and module ordering.
Docs updates
- Added module docs navigation and index entries for new
v0.5.xmodules. - Updated OpenClaw quick start notes for mixed
v0.4.x+v0.5.xfleets.
v0.5.0 — February 19, 2026
New optional hardening modules
- Added
self_defense(immutable control-plane protection + tamper detection). - Added
tripwire_guard(deterministic honeytoken tripwires for file/env probing). - Added
repetition_guard(identical-call loop detection). - Added
verdict_provider(external deterministic provider integration).
Network and sandbox controls
- Added
egress_guard.bindingModeto support tool-specific network binding (intersectwithtool_policyegress rules). - Added
exec_sandbox.childPolicy.networkcontrol for child-process network restrictions.
Approval and bridge behavior
- Added HTTP pending/polling flow support for bridge architectures.
- Clarified single-bot Telegram topology constraints for polling consumers.
v0.4.0 — February 18, 2026
Module deep dives (new)
- Added dedicated pages for all 11 modules:
kill_switch,skill_scanner,tool_policyfs_guard,command_guard,exec_sandboxegress_guard,output_dlp,rate_budgetapproval_gate,audit
- Converted
/docs/modules/into a module index with direct deep-dive links - Added practical defaults and config snippets for each module page
OpenClaw compatibility notes (new)
- Added validated OpenClaw + RADIUS compatibility snapshot in docs (real hook runs)
- Added production-safe baseline
radius.yamlfor OpenClaw withegress_guardandmoduleConfig.audit - Documented runtime caveat for
agentradius@0.4.0: prefermoduleConfig.auditin hook flows
v0.3.0 — February 18, 2026
New docs sections
- Added Modules with per-module purpose, config, and posture notes
- Added Features as a capability map
- Added this What’s New page for versioned updates
Website updates
- Hero and interaction polish aligned to the current “Calm Engineering” design language
- Removed noisy motion patterns (ticker/marquee style blocks)
- Improved tether interaction with cleaner label placement under the control
- New SVG brand assets: circular favicon and circle mark near wordmark
UX and accessibility
- Added keyboard-visible focus states for interactive elements
- Improved readability and spacing consistency across docs and landing blocks
v0.2.0 — February 2026
Security architecture baseline
- 11-module deterministic pipeline documented and reflected in examples
- Profile model stabilized:
local,standard,unbounded - OpenClaw quick start and generic quick start published
Operator tooling
doctorworkflow for config/runtime checkspentestworkflow for attack-scenario smoke tests- audit and approval sections expanded in configuration reference
v0.1.0 — January 2026
Initial public docs release:
- Overview, quick start, and configuration foundation
- Deterministic-enforcement positioning (no LLM in policy decisions)
Upgrade checklist (v0.4.x -> v0.5.x)
- Keep your current
modulesarray as-is first; upgrade runtime without enabling new modules yet. - Re-run
npx agentradius doctorandnpx agentradius pentest. - If you use SQLite-backed state in hook subprocess mode, set explicit
store.requiredper environment policy. - Enable new modules one-by-one (
self_defense,tripwire_guard,repetition_guard) and validate audit output. - If using tool-specific egress policy, switch
egress_guard.bindingModetointersectand define tool-levelegressbindings intool_policy.
Upgrade checklist (v0.3.x -> v0.4.0)
- Read Modules and verify your enabled module order.
- Re-run
npx agentradius doctoron your existingradius.yaml. - Re-run
npx agentradius pentestand compare results with previous baseline. - If you use custom policies, confirm fail-closed behavior still matches your intent.