Beginner Quickstart
This is the fastest way to get useful value from SecOpsAI without learning every feature up front.
SecOpsAI is a local-first security operations toolkit for OpenClaw, macOS, Linux, and Windows. It can collect telemetry, generate findings, correlate activity across platforms, and match local activity against threat-intel feeds.
What this quickstart covers
In about 10 minutes, you will:
- install SecOpsAI
- run your first refresh
- list and inspect findings
- try cross-platform collection
- run correlation
- refresh threat intel and match IOCs
1. Install SecOpsAI
Recommended install
curl -fsSL https://secopsai.dev/install.sh | bash
cd ~/secopsai
source .venv/bin/activate
Manual install
git clone https://github.com/Techris93/secopsai.git
cd secopsai
python3 -m venv .venv
source .venv/bin/activate
pip install -e .
Confirm the CLI is available:
secopsai --help
You should see commands such as:
refreshlivelistshowmitigatecheckcorrelateintel
2. Run your first refresh
Start with the default pipeline:
secopsai refresh
This is the easiest first run and is the best place to begin if you are primarily using SecOpsAI with OpenClaw.
3. Review findings
List findings:
secopsai list
Show only higher-priority findings:
secopsai list --severity high
Inspect one finding in detail:
secopsai show OCF-XXXX
Get mitigation guidance:
secopsai mitigate OCF-XXXX
4. Try platform-based collection
SecOpsAI can collect from one or more supported platforms using --platform.
Supported platform values:
openclawmacoslinuxwindows
Examples:
secopsai refresh --platform macos
secopsai refresh --platform linux
secopsai refresh --platform windows
secopsai refresh --platform openclaw
You can also combine platforms:
secopsai refresh --platform macos,openclaw
5. Run correlation
After collecting findings from more than one source, run correlation:
secopsai correlate
This helps connect related activity across users, hosts, IPs, time windows, or artifacts.
6. Refresh threat intel
Pull current IOC feeds:
secopsai intel refresh
List some locally stored indicators:
secopsai intel list --limit 20
Match IOCs against local data:
secopsai intel match --limit-iocs 500
7. Try live mode
Use live mode to validate collection or observe events in real time:
secopsai live --platform macos --duration 60
You can swap macos for any supported platform.
8. Useful JSON mode
For scripts and automation:
secopsai --json list
secopsai list --json
secopsai show OCF-XXXX --json
9. Best first walkthrough
If you want one short sequence to try everything important, run:
cd ~/secopsai
source .venv/bin/activate
secopsai --help
secopsai refresh
secopsai list
secopsai refresh --platform macos,openclaw
secopsai correlate
secopsai intel refresh
secopsai intel match --limit-iocs 500
10. Where to go next
- For full install and setup details: Getting Started
- For platform-by-platform usage: Operator Runbook
- For threat-intel details: Threat Intel
- For deployment patterns: Deployment Guide