Orgs · intermediate

Brand Protection

Deploy a brand protection system with 4 agents that monitor for unauthorized brand usage, classify threats, enforce takedowns, and visualize brand health. A scanner crawls marketplaces and social media for counterfeits and impersonation, a classifier categorizes violations by type and severity, an enforcer files DMCA notices and platform reports, and a dashboard tracks violation trends and enforcement success rates.

Agents
4
Skills
11
Difficulty
intermediate
Install
clawhub install pilot-brand-protection-setup
Skills used
Agents
<your-prefix>-scanner Brand Scanner
Crawls marketplaces, social media, and domains for unauthorized brand usage and counterfeits.
pilot-stream-datapilot-cronpilot-archive
<your-prefix>-classifier Threat Classifier
Classifies violations by type (counterfeit, impersonation, trademark), severity, and platform.
pilot-event-filterpilot-task-routerpilot-metrics
<your-prefix>-enforcer Takedown Enforcer
Files DMCA notices, platform reports, and cease-and-desist requests. Tracks enforcement status.
pilot-webhook-bridgepilot-audit-logpilot-receipt
<your-prefix>-dashboard Brand Dashboard
Visualizes brand health metrics, violation trends, and enforcement success rates.
pilot-metricspilot-slack-bridgepilot-announce
Data flows
<your-prefix>-scanner <your-prefix>-classifier :1002 brand-violation events from platform scans
<your-prefix>-classifier <your-prefix>-enforcer :1002 classified-threat with type, severity, and priority
<your-prefix>-enforcer <your-prefix>-dashboard :1002 enforcement-action with status and outcomes
<your-prefix>-dashboard external :443 brand-report via Slack and webhooks
Quick start
# Replace <your-prefix> with a unique name for your deployment (e.g. acme)
# On server 1 (brand scanner)
clawhub install pilot-stream-data pilot-cron pilot-archive
pilotctl set-hostname <your-prefix>-scanner

# On server 2 (threat classifier)
clawhub install pilot-event-filter pilot-task-router pilot-metrics
pilotctl set-hostname <your-prefix>-classifier

# On server 3 (takedown enforcer)
clawhub install pilot-webhook-bridge pilot-audit-log pilot-receipt
pilotctl set-hostname <your-prefix>-enforcer

# On server 4 (brand dashboard)
clawhub install pilot-metrics pilot-slack-bridge pilot-announce
pilotctl set-hostname <your-prefix>-dashboard
# scanner <-> classifier
# On scanner:
pilotctl handshake <your-prefix>-classifier "setup: brand-protection"
# On classifier:
pilotctl handshake <your-prefix>-scanner "setup: brand-protection"

# classifier <-> enforcer
# On classifier:
pilotctl handshake <your-prefix>-enforcer "setup: brand-protection"
# On enforcer:
pilotctl handshake <your-prefix>-classifier "setup: brand-protection"

# enforcer <-> dashboard
# On enforcer:
pilotctl handshake <your-prefix>-dashboard "setup: brand-protection"
# On dashboard:
pilotctl handshake <your-prefix>-enforcer "setup: brand-protection"
pilotctl trust

Ready to deploy Brand Protection?