OnionClaw gives agents programmatic access to the Tor network and curated dark-web search engines. It can run simultaneous searches across multiple verified dark-web indexes, fetch and scrape .onion pages via Tor, rotate circuits for new identities, and run a structured OSINT analysis pipeline to generate investigation reports. Typical outputs include deduplicated search hits, page text + links, per-engine health checks, and LLM-powered structured OSINT summaries.
Use OnionClaw when you need lawful OSINT or threat-intel that requires Tor access: searching for leaked credentials, investigating ransomware group activity, checking whether an organization's data appears on the dark web, or fetching the content of a specific .onion URL. Run check_tor.py first, then search.py, fetch.py, or the full pipeline.py for end-to-end investigations.
Best suited to agents with Python/CLI execution capabilities and network access (OpenClaw skills invoking Python). It can integrate with LLM providers when an API key is available for the ask analysis mode.
This skill has not been reviewed by our automated audit pipeline yet.