Big Hat Edition: Enterprise OpenClaw for Azure, Entra ID & Intune

Big Hat is a hard fork of OpenClaw, the leading open-source AI agent platform. We’ve stripped the consumer integrations, replaced the data layer, added enterprise authentication, and wired every byte to your Azure tenant.

Same agent capabilities. Completely different security posture.

Book a Demo


The Problem

OpenClaw is the most capable AI agent platform available β€” browser control, MCP tool integration, sub-agents, cron scheduling, persistent memory, and a skill system that makes agents genuinely useful.

But it was built for individuals, not organizations.

  • 12+ consumer messaging channels (WhatsApp, Telegram, Discord, Signal, iMessage, IRC, Line…) β€” each one a potential data leakage vector
  • No authentication β€” single-user daemon with no identity layer
  • SQLite on local disk β€” no enterprise persistence, no audit trail
  • Public API keys for LLM inference β€” data routes through third-party endpoints
  • Prompt-driven approval β€” the agent reads workspace files to decide whether to ask before acting. A compromised skill file can suppress approvals entirely.
  • No cost controls β€” no budgets, no token tracking, no spend visibility

For a personal productivity tool, this is fine. For an enterprise deployment, it’s a non-starter.


What Big Hat Changes

Big Hat keeps everything that makes OpenClaw powerful β€” the agent runtime, tool dispatch, MCP integration, skills engine, sub-agents, cron, browser automation β€” and replaces everything that makes it unsuitable for enterprise.

This isn’t a config layer or a wrapper. It’s a hard fork with 14,000+ lines of consumer code removed and enterprise infrastructure built in.


πŸ”’ Consumer Channels β€” Deleted, Not Disabled

OpenClaw ships with integrations for WhatsApp, Telegram, Discord, Slack, Signal, iMessage, IRC, Line, Google Chat, and more. Big Hat removes all of them from the codebase. The channel registry is reduced to exactly two:

  • Microsoft Teams (via Azure Bot Service)
  • Web Chat (built-in)

This isn’t a feature toggle. The code is gone. Your enterprise data physically cannot reach a consumer messaging API.


πŸ›‘οΈ Code-Enforced Security β€” Not Prompt-Driven

OpenClaw’s approval system has a structural weakness: it’s partially behavioral. The agent reads workspace files (AGENTS.md, SOUL.md, skill Markdown files) as trusted instructions. A compromised skill file can instruct the agent to execute all commands without asking.

Big Hat makes approval enforcement structural:

  • Approval mode (always / dangerous-only / full-auto) lives in the application config β€” the agent process checks it before every tool invocation. The agent cannot modify its own security policy.
  • Dangerous tools are classified in code: exec, spawn, shell, sessions_spawn, sessions_send, gateway, fs_write, fs_delete all require explicit human approval in dangerous-only mode.
  • Protected files (AGENTS.md, SOUL.md, BOOTSTRAP.md) have integrity monitoring β€” modifications are logged or blocked depending on policy.
  • Auto-exec timeout β€” commands that run without human approval are killed after a configurable timeout (default: 30 seconds).
// Security policy is code-enforced, not prompt-driven
const SecurityPolicySchema = z.object({
 Β approvalMode: z.enum(['always', 'dangerous-only', 'full-auto']),
 Β dangerousTools: z.array(z.string()),
 Β protectedFiles: z.array(z.string()),
 Β fileIntegrityMode: z.enum(['off', 'log', 'block']),
 Β maxAutoExecTimeoutMs: z.number(),
});

πŸ“ INSERT-Only Audit Trail

Every tool invocation, approval decision, config change, and workspace file modification is logged to a security_audit_log table in PostgreSQL.

The agent’s database role cannot UPDATE or DELETE audit records. Row-level security enforces this at the database level β€” even if the application is compromised, the audit trail is immutable.

What’s LoggedDetails
Tool invocationsTool name, arguments, result, approval status, timestamp
Approval decisionsWho approved, approval mode at time of invocation
Config changesBefore/after values, who changed it, timestamp
File integrity eventsFile path, hash before/after, action taken
Model interactionsModel used, token counts, estimated cost, session ID

πŸ” Ed25519 Signed Skills

The #1 attack vector against AI agents is skill injection β€” modifying or replacing a skill file to change the agent’s behavior. Big Hat implements cryptographic skill verification:

  • Every built-in skill ships with an Ed25519 detached signature
  • The agent verifies signatures at load time
  • Trust levels control what happens with unsigned skills:
Trust LevelBehavior
strictUnsigned skills are blocked. Only signed skills execute.
warnUnsigned skills load but generate an audit entry and alert.
permissiveAll skills load. Development mode only.

πŸ—οΈ Every Byte in Your Azure Tenant

Big Hat replaces OpenClaw’s local-first data architecture with Azure-native services. Nothing leaves your tenant.

Data TypeOpenClawBig Hat
LLM inferenceAnthropic / OpenAI public APIAzure AI Foundry (your subscription, your region)
EmbeddingsLocal or third-partyAzure OpenAI (your subscription)
Vector memorySQLite + sqlite-vec (local disk)Azure AI Search (your tenant)
Telemetry & tracingLocal log filesAzure Application Insights + AI Foundry tracing
MessagingWhatsApp / Telegram / SignalMicrosoft Teams + Exchange Online (Graph API)
Secrets.env files or local configAzure Key Vault (RBAC, rotation, audit)
Structured dataSQLite (local)PostgreSQL (local or Azure Database)
Agent runtimeDeveloper’s laptopWindows 365 Cloud PC (Intune-managed)

πŸ”‘ Entra ID SSO with On-Behalf-Of Flow

OpenClaw has no authentication. Big Hat uses Entra ID as the single identity provider:

  • User signs in once via Teams (already Entra-authenticated) or web UI (MSAL redirect)
  • OBO (On-Behalf-Of) flow exchanges the user’s token for scoped downstream tokens β€” the agent operates with the user’s permissions, not over-privileged service accounts
  • Unattended scenarios (heartbeats, cron jobs) use an app registration with client certificate
  • Each customer gets their own Entra app registration β€” tokens scoped to their directory
  • Credentials stored in Key Vault β€” no .env files in production

πŸ’° Cost Control Engine

OpenClaw has no cost visibility. Big Hat tracks and caps every token:

ControlWhat It DoesDefault
Pre-flight estimationEstimates input token count before each LLM call. Warns if over threshold.Warn at 50K tokens
Daily user budgetBlocks requests when cumulative daily spend is exceeded.500K tokens/day
Heartbeat budgetSeparate ceiling for automated background tasks.50K tokens/day
Cron input guardRejects cron tasks with oversized context.Reject at 100K tokens
Historical trackingEvery LLM call logs model, tokens (in/out), estimated USD cost, timestamp, session ID to PostgreSQL.Always enabled
Status commandbighat status shows daily/weekly/monthly usage and spend.Always available

⚑ Two-Tier Model Routing

Big Hat routes to models through Azure AI Foundry exclusively, with automatic tier selection:

TierModelWhen It’s Used
WorkhorseClaude Sonnet 4Orchestration, reasoning, code generation, compliance analysis
LightweightClaude Haiku 3.5Heartbeat checks, log summaries, status formatting, simple queries
Manual EscalationClaude Opus 4Complex multi-step reasoning β€” never auto-selected

High-stakes operations (GPO changes, production deployments, compliance analysis) automatically enable extended thinking. No manual configuration needed.

No silent failover. If Azure AI Foundry is unavailable, Big Hat reports the outage clearly β€” it does not fall back to a different provider. Silent model switching could violate data residency requirements.


🩺 Production Reliability

Big Hat runs as a Windows service (NSSM-managed) with enterprise health monitoring:

  • /healthz endpoint β€” polled by the service wrapper for liveness
  • Watchdog timer β€” self-terminates on 30-second event loop hangs, triggering automatic restart
  • Resource guards β€” exits cleanly if memory or CPU thresholds are exceeded
  • MCP server supervision β€” crashed MCP servers auto-restart with exponential backoff (1s initial β†’ 60s max, 10 retries)
  • Azure Monitor alerts β€” no-heartbeat, excessive restarts, MCP failures trigger alerts to your ops team

🎯 Guardrails Against Model Drift

AI agents generating code from stale training data is a real risk. Big Hat implements Fetch-Before-Flight:

  1. The agent cannot generate domain-specific code until it retrieves current documentation from the relevant MCP server
  2. Retrieved docs are injected immediately before the generation step, anchoring the model to current APIs
  3. A self-correction loop (generate β†’ analyze β†’ fix, max 3 iterations) catches deprecated patterns post-generation

This turns the agent from a probabilistic code generator into a deterministic framework β€” critical when a syntax error could affect hundreds of machines.


MCP Servers

Big Hat ships with purpose-built MCP servers for enterprise IT β€” not generic integrations:

Microsoft First-Party (Integrated)

ServerTransportWhat It Does
Azure MCPstdioAzure resource management, CLI commands, monitoring
GitHub MCPstdioRepo management, PR automation, Actions workflows
Enterprise MCPHTTP/SSEEntra ID / Graph read-only queries (users, groups, devices)
Microsoft Learn MCPHTTPReal-time grounding against official Microsoft documentation

Built by Big Hat Group

ServerDomainWhat It Does
Packager-MCPApplication packagingPSADT v4.x script generation with model drift guardrails
Defender-MCPEndpoint securityDevice and file scanning
MSIX-MCPMSIX packagingPackage creation, troubleshooting, signing workflows
JIRA-MCPIssue trackingJQL search, issue creation, transitions, bulk operations

Planned (Phase 2+)

Intune management (full read/write), CIS benchmark compliance, Azure DevOps, ServiceNow ITSM.


Skills

Big Hat ships with a library of purpose-built skills for enterprise IT operations β€” application packaging, endpoint security, compliance analysis, identity auditing, and cost optimization. These skills are Ed25519-signed and verified at load time.

Beyond Big Hat’s own skill library, the platform supports third-party and community skills. Any OpenClaw-compatible skill can be signed for use with Big Hat β€” once signed, it’s treated with the same trust level as a built-in skill. This lets customers bring in specialized skills from partners, vendors, or their own teams without weakening the security model. From legal to coding Skills are a pathway to getting the most out of your agents.

Customers can also create custom skills as Markdown files with YAML frontmatter β€” Big Hat automatically discovers and loads them.


Deployment

Big Hat is designed to run on a Windows 365 Cloud PC β€” a persistent, Intune-managed endpoint with its own Entra ID identity. The agent gets the same desktop, tools, and governance as any other managed device.

Detail
RuntimeNode.js 22.x LTS on Windows 11
ServiceNSSM Windows service with health checks and auto-restart
InstallerWiX v5 MSI (per-user) or Intune .intunewin package
SetupGuided PowerShell scripts: Setup-GraphMail.ps1, Setup-AppInsights.ps1, Setup-MemoryInfra.ps1, Setup-Teams.ps1
InfrastructureTerraform modules for Azure dependencies (Entra app, Key Vault, Log Analytics, AI Foundry)

Compliance Roadmap

Big Hat is architected for certification from day one:

FrameworkTarget TimelineStatus
SOC 2 Type IMonth 6–9Architecture complete. Formal policies in progress.
SOC 2 Type IIMonth 12–15Observation period begins after Type I.
ISO 27001Month 15–21ISMS documentation planned.

Already implemented: Encryption at rest (Postgres TDE, Key Vault), encryption in transit (TLS 1.2+), INSERT-only audit logging with RLS, code-enforced approval workflows, Ed25519 signed update manifests, Azure Monitor alerting, change management via OpenSpec proposals.


Feature Comparison: OpenClaw vs. Big Hat

FeatureOpenClawBig Hat
Agent runtime + MCP toolsβœ…βœ…
Browser control (Playwright)βœ…βœ…
Skills engine + sub-agentsβœ…βœ…
Cron, webhooks, heartbeatsβœ…βœ…
WhatsApp / Telegram / Discord / Signal / iMessageβœ…βŒ Removed
Microsoft Teamsβœ… (extension)βœ… (primary channel)
Authentication❌ Noneβœ… Entra ID SSO + OBO
DatabaseSQLite (local)βœ… PostgreSQL
Audit trailβŒβœ… INSERT-only with RLS
Skill signingβŒβœ… Ed25519
Cost controlsβŒβœ… Per-user budgets
Model routingAny providerβœ… Azure AI Foundry only
TelemetryLocal logsβœ… App Insights + Foundry tracing
Memory backendsqlite-vecβœ… Azure AI Search
Secret storage.env / local configβœ… Azure Key Vault
MSI installerβŒβœ… WiX v5
Intune deploymentβŒβœ… .intunewin
Windows Service modeβŒβœ… NSSM + Event Log
Health endpointsβŒβœ… /healthz, /readyz, /livez
Data residencyLocal diskβœ… Your Azure tenant

FAQ

What is Big Hat?

Big Hat is an enterprise AI agent platform β€” a hard fork of OpenClaw with consumer integrations removed, Entra ID authentication added, and all data routed through your Azure tenant. It’s a software product built and maintained by Big Hat Group Inc.

How is it different from just configuring OpenClaw?

Configuration can’t remove code. OpenClaw’s consumer channel integrations, SQLite data layer, and prompt-driven approval system are architectural β€” they can’t be fixed with settings. Big Hat is a hard fork: 14,000+ lines of consumer code deleted, PostgreSQL replacing SQLite, Entra ID authentication built in, Ed25519 skill signing implemented. These are code changes, not config toggles.

How is it more secure than OpenClaw?

Six concrete ways: (1) Consumer messaging channels deleted from the codebase. (2) Approval enforcement is code-level, not prompt-driven β€” the agent can’t modify its own security policy. (3) INSERT-only audit trail in PostgreSQL with row-level security. (4) Ed25519 signed skills prevent skill injection. (5) All LLM inference routes through your Azure AI Foundry. (6) Protected workspace files with integrity monitoring.

Where does data go?

Your Azure tenant. LLM inference through Azure AI Foundry. Embeddings through Azure OpenAI. Vector memory in Azure AI Search. Telemetry in Application Insights. Secrets in Key Vault. No data leaves your Azure perimeter.

What models does it use?

Claude Sonnet 4 (workhorse), Claude Haiku 3.5 (lightweight), Claude Opus 4 (manual escalation) β€” all through Azure AI Foundry. Model selection is automatic. No public API keys.

Can I add my own integrations?

Yes. Custom MCP servers (stdio or HTTP) and custom skills (Markdown with YAML frontmatter) are automatically discovered. No core code changes needed.

What’s the compliance status?

SOC 2 Type I targeted at month 6–9. The architecture is compliance-first: encryption, audit logging, access control, and incident detection are already implemented. The remaining work is formalization and third-party attestation.

How is Big Hat different from Big Hat Group?

Big Hat is the product β€” the enterprise AI agent platform. Big Hat Group Inc. is the company that builds and maintains it.


Get Started

We’re onboarding early enterprise adopters. Start with a One-Week Jumpstart β€” a working AI agent pilot in your environment in five business days.

Book a Demo β†’


Big Hat is built and maintained by Big Hat Group Inc. Built on OpenClaw. Hardened for the enterprise.

Kevin Kaminski is a 17x Microsoft MVP with 25 years of enterprise IT experience specializing in Windows 365, Intune, Azure infrastructure, and AI agent deployment. He leads Big Hat Group, delivering consulting, training, and managed services for organizations modernizing their endpoint and cloud operations.

Learn More About Big Hat Group β†’

Ready to Get Started?

Book a discovery call to discuss your Enterprise AI agent platform implementation needs.

Book a Discovery Call