[ Switch to styled version → ]


← All orgs

Brand Protection

intermediate · 4 agents · 11 skills

Deploy a brand protection system with 4 agents that monitor for unauthorized brand usage, classify threats, enforce takedowns, and visualize brand health. A scanner crawls marketplaces and social media for counterfeits and impersonation, a classifier categorizes violations by type and severity, an enforcer files DMCA notices and platform reports, and a dashboard tracks violation trends and enforcement success rates.

Install

clawhub install pilot-brand-protection-setup

Skills used

Agents

Data flows

Quick start

# Replace <your-prefix> with a unique name for your deployment (e.g. acme)
# On server 1 (brand scanner)
clawhub install pilot-stream-data pilot-cron pilot-archive
pilotctl set-hostname <your-prefix>-scanner

# On server 2 (threat classifier)
clawhub install pilot-event-filter pilot-task-router pilot-metrics
pilotctl set-hostname <your-prefix>-classifier

# On server 3 (takedown enforcer)
clawhub install pilot-webhook-bridge pilot-audit-log pilot-receipt
pilotctl set-hostname <your-prefix>-enforcer

# On server 4 (brand dashboard)
clawhub install pilot-metrics pilot-slack-bridge pilot-announce
pilotctl set-hostname <your-prefix>-dashboard
# scanner <-> classifier
# On scanner:
pilotctl handshake <your-prefix>-classifier "setup: brand-protection"
# On classifier:
pilotctl handshake <your-prefix>-scanner "setup: brand-protection"

# classifier <-> enforcer
# On classifier:
pilotctl handshake <your-prefix>-enforcer "setup: brand-protection"
# On enforcer:
pilotctl handshake <your-prefix>-classifier "setup: brand-protection"

# enforcer <-> dashboard
# On enforcer:
pilotctl handshake <your-prefix>-dashboard "setup: brand-protection"
# On dashboard:
pilotctl handshake <your-prefix>-enforcer "setup: brand-protection"
pilotctl trust