OpenClaw Starter Guide
9 chapters live ยท 11 more coming ยท Last updated: March 2026
What's inside
- โOpenClaw vs Claude vs Others
- โCheapest LLM providers
- โ60+ hosting options
- โ37 prompts for real use cases
- โ25 essential skills
- โ5 best memory plugins
Let's dive in!
What OpenClaw Is (and Why People Get Excited About It)
You might be thinkingI keep hearing about OpenClaw and AI agents, but what would I actually do with one?
If that's where you are โ good. That's the right place to start.
The simple idea
OpenClaw lets you run your own AI assistant and talk to it through normal like , , , , and others โ instead of keeping it trapped in one browser tab.
But channels are just the starting point. OpenClaw can also run scheduled and recurring tasks via , emulate proactive behavior through so the assistant checks on things without being asked, and connect your phones, laptops, and other devices as โ making their cameras, screens, and local commands available to the agent through a single .
OpenClaw is fully โ you can read every line of code, audit the security model, and contribute. It went from zero to the #1 most-starred project on GitHub in about four months, which is unprecedented for any software project.
Why this matters in practice
| With OpenClaw | Without OpenClaw | |
|---|---|---|
| Reach | Message it from Telegram while walking the dog | Open a browser tab when you remember |
| Context | Picks up where you left off โ across days and devices | Copy-paste the same background every time |
| Scheduling | Cron job briefs you every morning with what matters | Set a reminder and do the task yourself |
| Proactivity | Heartbeat checks your inbox and flags what's urgent | You have to ask every single time |
| Devices | Phone camera, desktop files, server CLI โ all reachable | Works on one screen in one browser |
| Tools | Chain skills: draft in Notion, review in Slack, file in Drive | One-off tasks, one at a time |
| Ownership | Your setup, your data, your rules โ runs on your hardware | Locked into one vendor's product roadmap |
With OpenClaw
- Reach
- Message it from Telegram while walking the dog
- Context
- Picks up where you left off โ across days and devices
- Scheduling
- Cron job briefs you every morning with what matters
- Proactivity
- Heartbeat checks your inbox and flags what's urgent
- Devices
- Phone camera, desktop files, server CLI โ all reachable
- Tools
- Chain skills: draft in Notion, review in Slack, file in Drive
- Ownership
- Your setup, your data, your rules โ runs on your hardware
Without OpenClaw
- Reach
- Open a browser tab when you remember
- Context
- Copy-paste the same background every time
- Scheduling
- Set a reminder and do the task yourself
- Proactivity
- You have to ask every single time
- Devices
- Works on one screen in one browser
- Tools
- One-off tasks, one at a time
- Ownership
- Locked into one vendor's product roadmap
What OpenClaw is not
- โขIt's not "the best model." You choose models/providers separately.
- โขIt's not just a chatbot UI.
- โขIt's not magic autonomy that replaces judgment.
Think of it as infrastructure that makes an assistant usable, portable, and extensible.
Where OpenClaw is a great fit
You own it
Your setup, your data paths, your rules.
In your apps
Assistant available in the channels you already use.
You tweak it
Ability to add tools, skills, and automations as needs grow.
Community drives it
Not tied to one app vendor's product direction.
Where OpenClaw is a bad fit (for now)
If this is what you expect, OpenClaw might be a misfit:
- โขA ready-made product that works out of the box with zero setup or maintenance.
- โขA consumer app you install once and never think about again.
- โขSomething that makes all the decisions for you โ models, security, channels โ without your input.
None of that is a flaw in OpenClaw โ it's a fit question. If you want full control, you'll need to make some choices. This guide is here to make them fast and painless.
A practical expectation to set up front
OpenClaw gives you leverage, not instant perfection. The payoff is long-term: once configured well, it can become a serious personal operating layer. But the first setup still needs decisions (hosting, model provider, channels, safety boundaries). This guide exists to make those decisions clear and fast.
Before you dive in: a security reality check
OpenClaw is powerful, fast-moving, alpha-stage software. It can execute commands, read files, send messages, and access APIs on your behalf. That power comes with real risk.
- โขIt processes input from untrusted sources โ messages, emails, web content โ making it vulnerable to prompt injection attacks.
- โขLLMs can misuse tools in unexpected ways, especially with broad permissions or weak models.
- โขA misconfigured setup can expose personal files, credentials, or connected services.
Don't rush. Read the security sections of this guide before granting broad access. Start with minimal permissions and expand deliberately. The time you spend thinking about boundaries now will save you from real incidents later.
How to read this guide
Subscribe
20 chapters covering hosting, models, channels, security, and more. Get notified as new sections drop.
Join 1,200+ operators getting guide updates
Where OpenClaw Fits Among Today's AI Assistants
You might be thinkingDo I actually need OpenClaw, or should I just use ChatGPT / Claude / Codex / Copilot / Manus?
That is exactly the right question. These tools overlap, but they are not trying to solve the exact same problem.
The practical difference most people feel first
The biggest day-1 difference is simple: can this assistant meet you in the apps you already use every day, or does it mostly live inside its own official interface?
How OpenClaw compares
| OpenClaw | ChatGPT | Claude | Copilot | Manus | |
|---|---|---|---|---|---|
| Primary strength | Channel-native agent | General assistant | Coding/office work | Code assistant | Vibe-coding |
| Channel reach | Telegram, WhatsApp, Discord, Slack, + | Own app + API | Own app + API | IDE + GitHub | Own app |
| Self-hostable | Yes (core feature) | No | No | No | No |
| Customization depth | Full (tools, skills, config) | Limited (GPTs) | High (skills, hooks) | Extensions | Limited |
| Best for | Long-term personal agent | Quick answers | Complex tasks | Coding workflows | Quick prototypes |
OpenClaw
- Primary strength
- Channel-native agent
- Channel reach
- Telegram, WhatsApp, Discord, Slack, +
- Self-hostable
- Yes (core feature)
- Customization depth
- Full (tools, skills, config)
- Best for
- Long-term personal agent
ChatGPT
- Primary strength
- General assistant
- Channel reach
- Own app + API
- Self-hostable
- No
- Customization depth
- Limited (GPTs)
- Best for
- Quick answers
Claude
- Primary strength
- Coding/office work
- Channel reach
- Own app + API
- Self-hostable
- No
- Customization depth
- High (skills, hooks)
- Best for
- Complex tasks
Copilot
- Primary strength
- Code assistant
- Channel reach
- IDE + GitHub
- Self-hostable
- No
- Customization depth
- Extensions
- Best for
- Coding workflows
Manus
- Primary strength
- Vibe-coding
- Channel reach
- Own app
- Self-hostable
- No
- Customization depth
- Limited
- Best for
- Quick prototypes
Which AI agent is the best?
This market changes every week. Instead of pretending there is one universal winner, use this as a fit check.
- โIf you want the fastest start and minimal setup, commercial agents are often the right first move.
- โIf you want one assistant you can shape, route, and run in your own environment and channels, OpenClaw is often the better long-term path.
- โA hybrid path is normal: start with commercial agents for speed, then move into OpenClaw when control and channel reach become real constraints.
OpenClaw ecosystem momentum
322k+
GitHub stars
62k+
Forks
0 โ #1
GitHub rank in 4 months
1.5k+
Watchers
OpenClaw became the most popular open-source project on GitHub in 4 months. The numbers above don't guarantee it's "best", but they signal real operators are stress-testing the ecosystem in production-like conditions.
Deployment Choices: Local vs Dedicated Hardware vs VPS vs Docker
The first deployment question is not "what is easiest?" It is: what can this access if it gets tricked, misbehaves, or makes a mistake?
OpenClaw can process external input (messages, web content, email, tools). That means and tool misuse are real operational risks, not edge cases. So your deployment choice is mainly a decision.
The security-first mental model
Trust boundary
What data/systems must never be reachable?
Power level
Should the agent have shell/file/network/tool access, and how much?
Exposure surface
Which inbound channels/tools can feed untrusted input?
Operational tolerance
How much setup/admin burden can you actually maintain?
Quick compare (with risk lens)
Controlled experiments with minimal privileges
Accidental access to personal files, tokens, browser sessions, SSH keys
You intentionally sandbox/restrict tools, isolate user/workspace, and understand host permissions
High convenience, potentially high consequence
Practical default recommendations
- โIf the agent gets broad shell/tool access: prefer dedicated hardware or isolated VPS over your personal laptop.
- โIf you want fastest path with lower infra burden: consider managed hosting, then migrate later.
- โIf you run local anyway: treat it as high-risk unless heavily restricted.
Common failure modes
- โGranting powerful tools before defining trust boundaries
- โRunning on a personal machine with sensitive data and broad shell access
- โAssuming prompt-injection is theoretical
- โExposing gateway/network surface before hardening auth + access path
- โConfusing Docker with security architecture
Find Your Deployment Path
Will the agent have shell or tool access?
Hosting Options: Managed Providers vs Raw VPS
This section helps you choose a hosting path in minutes. The choice is not just about hosting โ it is a control vs responsibility decision.
Managed vs Raw VPS: what you are actually choosing
With managed providers, you pay to remove operational burden: faster setup, fewer infra tasks, and often a cleaner admin experience. With a raw VPS, you keep maximum control over runtime, upgrades, security posture, and portability โ but you own every mistake and every maintenance task.
| Managed | Raw VPS | |
|---|---|---|
| Setup speed | Fast โ often one-click or wizard | Slower โ manual config and hardening |
| Operational burden | Provider handles updates, patches, backups | You own everything: updates, backups, monitoring |
| Control depth | Limited by provider (dashboard-only or partial SSH) | Full: SSH, filesystem, network, config |
| Security transparency | Varies โ some providers are opaque | Full visibility into what runs and where |
| Lock-in risk | Higher โ migration effort varies by provider | Lower โ standard OpenClaw install, portable |
| Cost model | Monthly subscription (predictable) | VPS/hardware cost + your time (variable) |
Managed
- Setup speed
- Fast โ often one-click or wizard
- Operational burden
- Provider handles updates, patches, backups
- Control depth
- Limited by provider (dashboard-only or partial SSH)
- Security transparency
- Varies โ some providers are opaque
- Lock-in risk
- Higher โ migration effort varies by provider
- Cost model
- Monthly subscription (predictable)
Raw VPS
- Setup speed
- Slower โ manual config and hardening
- Operational burden
- You own everything: updates, backups, monitoring
- Control depth
- Full: SSH, filesystem, network, config
- Security transparency
- Full visibility into what runs and where
- Lock-in risk
- Lower โ standard OpenClaw install, portable
- Cost model
- VPS/hardware cost + your time (variable)
The practical tradeoff
Managed hosting is usually better when:
- +You want to launch quickly
- +You do not want to run SSH/server ops daily
- +You value bundled UX/features over raw control
Raw VPS is usually better when:
- +You need strict control over security/networking
- +You want predictable portability and low lock-in risk
- +You can operate updates/backups/monitoring yourself
Managed hosting provider directory
103 tracked providers
Simen
simen.ai
Deploy your OpenClaw AI agent in 60 seconds โ no coding, no servers. Automate email, scheduling & more via WhatsApp or Slack. Start free today.
Hostinger
hostinger.com
Choose Hostinger and make the perfect site. From Shared Hosting and Domains to VPS and Cloud plans. We have all you need for online success.
xCloud
xcloud.host
Unlock xCloud - the next-gen managed hosting panel for WordPress and server management to automate setup & maximize performance.
RunClaw
runclaw.ai
Deploy an SSH key-secured OpenClaw bot in 5 minutes. Docker-sandboxed, UFW firewall, fail2ban, auto-updated, fully managed.
OpenClaw Setup
openclaw-setup.me
Managed OpenClaw hosting with built-in chat, file uploads, Telegram/Slack/WhatsApp, and per-model cost tracking.
Blink Claw
blink.new
Run OpenClaw without Docker, a VPS, or separate AI accounts. One-click deployment, 200+ AI models included, unlimited agents, always-on.
KiloClaw
kilo.ai
Your personal AI agent, managed and secured by Kilo. Deploy OpenClaw in seconds with 500+ models, enterprise security, and zero DevOps.
ClawSimple
clawsimple.com
Managed OpenClaw hosting for Telegram bots with BYOK on every paid plan, official Telegram bot support, secure runtime defaults, and multiple agents per server.
OpenClaw Cloud (setupopenclaw)
setupopenclaw.com
Get OpenClaw (formerly Clawdbot/Moltbot) running in 60 seconds. No terminal, no VPS management. Fully managed AI assistant with free LLM, 15+ skills pre-installed.
EasyClaw Pro
easyclaw.pro
EasyClaw makes OpenClaw deployment one click. Connect Telegram, Discord, or WhatsApp, choose Claude, GPT, or Gemini, and go live in under 1 minute.
OpenClaw AI
openclawd.ai
OpenClaw AI - Open-source personal intelligence system running on your hardware. Deploy on Mac mini, Windows, or Linux. Formerly named Clawdbot and Moltbot.
Klaus
klausai.com
Your AI employee in five minutes. Secure OpenClaw in the cloud with every model, hundreds of integrations, and all your accounts. Trusted by hundreds of businesses.
Where to start?
Start managed, move to raw VPS later
Launch fast, learn what matters, then migrate when control becomes a constraint.
Start with raw VPS, offload to managed later
Build expertise first, then offload ops when time becomes the bottleneck.
Either way, keep your OpenClaw config and workspace portable from day one.
LLM Provider Strategy: Cost, Reliability, and Risk
Model choice is not just about quality. In OpenClaw, it directly affects operating cost, tool-use reliability, and security posture.
Cheapest path to top-tier models
For many users, the lowest-cost way to run strong models is to connect OpenClaw to an existing subscription rather than pure pay-per-token APIs.
Important caveat: subscription connectors are policy-dependent
OpenAI vs Anthropic posture
OpenRouter and pay-per-token aggregators
is excellent for model breadth and fast experimentation, but high-usage assistants can get expensive fast under pure token billing.
| API-key direct | Subscription connector | OpenRouter | |
|---|---|---|---|
| Cost model | Pay per token | Flat subscription fee | Pay per token (aggregated) |
| Model breadth | One provider's models | One provider's models | Many providers, many models |
| Cost predictability | Variable โ depends on usage | Predictable monthly cost | Variable โ can spike with heavy use |
| Policy risk | Low โ official API usage | Medium โ policies can change | Low โ designed for external use |
| Best for | Production reliability | Cost-sensitive high usage | Exploration and model switching |
API-key direct
- Cost model
- Pay per token
- Model breadth
- One provider's models
- Cost predictability
- Variable โ depends on usage
- Policy risk
- Low โ official API usage
- Best for
- Production reliability
Subscription connector
- Cost model
- Flat subscription fee
- Model breadth
- One provider's models
- Cost predictability
- Predictable monthly cost
- Policy risk
- Medium โ policies can change
- Best for
- Cost-sensitive high usage
OpenRouter
- Cost model
- Pay per token (aggregated)
- Model breadth
- Many providers, many models
- Cost predictability
- Variable โ can spike with heavy use
- Policy risk
- Low โ designed for external use
- Best for
- Exploration and model switching
Local models: powerful but advanced-only
Local LLM setups are for advanced operators who can manage hardware, latency, context limits, and model quality tradeoffs. Local can reduce external API cost, but weaker locally hosted models can reduce safety/reliability for tool-using agents.
The easiest local model runner. Great for quick experimentation. Supports a wide range of models with simple pull-and-run commands.
https://ollama.com/ โRecommended starter patterns
Subscription connector (OpenAI/Codex or Copilot)
API-key fallback (OpenAI or Anthropic)
Cheapest high-quality path, but connector policies can change
Channel Strategy: Telegram vs WhatsApp vs Slack vs Discord
OpenClaw is primarily designed as a personal agent (one trusted operator boundary), not a hostile multi-tenant system by default. Channel strategy is a security design task first, then a UX decision.
Baseline safety posture (before adding channels)
Baseline safety posture (before adding channels)
0 of 5 completed
openclaw security audit --deep
openclaw security audit --fixQuick fit guide
| Telegram | Discord | Slack | ||
|---|---|---|---|---|
| Best for | Solo operators, fast setup | Personal daily usage | Multi-room workflows | Workplace environments |
| Setup difficulty | Easy (bot token) | Medium (QR link) | Medium (bot app + intents) | Hard (app + scopes + config) |
| Group support | Groups + forum topics | Groups (JID-based) | Guilds + channels + threads | Channels + threads |
| Command UX | Strong native | Basic | Strong native | Manual slash setup |
| Main caveat | Bot API limits | Linked account (not Business API) | Permission complexity | Heaviest config overhead |
Telegram
- Best for
- Solo operators, fast setup
- Setup difficulty
- Easy (bot token)
- Group support
- Groups + forum topics
- Command UX
- Strong native
- Main caveat
- Bot API limits
- Best for
- Personal daily usage
- Setup difficulty
- Medium (QR link)
- Group support
- Groups (JID-based)
- Command UX
- Basic
- Main caveat
- Linked account (not Business API)
Discord
- Best for
- Multi-room workflows
- Setup difficulty
- Medium (bot app + intents)
- Group support
- Guilds + channels + threads
- Command UX
- Strong native
- Main caveat
- Permission complexity
Slack
- Best for
- Workplace environments
- Setup difficulty
- Hard (app + scopes + config)
- Group support
- Channels + threads
- Command UX
- Manual slash setup
- Main caveat
- Heaviest config overhead
Pairing and access model
Across major channels, DMs typically default to policy: unknown senders get a code, messages are not processed until approved, and codes expire (roughly 1 hour).
openclaw pairing list <channel>
openclaw pairing approve <channel> <CODE>All DMs share one session per agent. Fine for single trusted operator. Risky for multi-user setups.
You are the only person who will DM this agent.
Context bloat and token burn
/usage tokens
/usage full
/usage cost
/status
/context detailHow group chats work
Group sessions isolate by chat ID; forum topics append :topic:<id>. Per-topic agentId routing is supported. Security controls: groups allowlist, groupPolicy, allowFrom, requireMention.
Recommended rollout order
Start with one channel
Telegram or WhatsApp for most personal setups.
Lock DM policy + allowlists
Configure pairing and access controls before anything else.
Set dmScope explicitly
Choose the right isolation level for your trust boundary.
Enable usage visibility
Run /usage tokens or /usage full to monitor costs early.
Add group/channel access
Only after permissions and mention gating are verified.
Add second channel
Only after cost + policy behavior is stable on the first.
Step-by-step: adding OpenClaw to a group
Each channel has its own bot/account identity. You add that identity to groups using native platform controls. That identity does not always map to exactly one agent โ OpenClaw can dynamically route inbound messages to different agents based on bindings and policies.
Connect one channel identity
Configure bot token via BotFather
Add identity to target group
Add bot to group or supergroup
Configure access policy
Set dmPolicy, groupPolicy, groups allowlist, requireMention
Test engagement rules
With requireMention: true, only @mentions trigger processing. With requireMention: false and authorized sender, regular messages trigger. Unauthorized senders are always ignored.
Verify agent routing
OpenClaw resolves one agent per message using routing precedence: exact peer match, then parent/thread inheritance, then guild/team/account bindings, then default agent fallback.
Verify session isolation
DMs use dmScope setting. Groups/channels isolate by channel + group ID. Threads/topics get additional isolation suffixes.
Confirm reply routing
Replies go back to the same inbound channel deterministically. The model does not choose the outbound channel.
Bundles & Wrappers: Bare OpenClaw vs Packaged Offerings
You can self-host OpenClaw without building everything manually from scratch. A bundle or installer is a community-maintained layer around OpenClaw that prepackages some combination of host hardening, setup automation, prefilled config templates, dashboards, and multi-agent conventions.
What bundles are
Bundles trade flexibility for speed. They are most useful for local dedicated hardware (Mac mini, Pi, mini-PC), raw VPS setups where you want fewer manual steps, and teams who want operational defaults quickly. They are less useful when you need fully custom architecture from day one.
Three examples
Security-first automation for Debian/Ubuntu servers. Includes firewall setup, Tailscale/VPN patterns, and a hardened install flow.
Best for: Operators who want reproducible, security-conscious server setup
View on GitHub โClawdboss
Opinionated multi-agent setup with install wizard, templated workspaces, security posture defaults, and optional tooling stack.
Best for: Users who want a pre-hardened multi-agent environment quickly
View on GitHub โAlphaClaw
Wrapper/harness approach emphasizing setup UX, operations tooling, watchdog/recovery, and dashboard-style management.
Best for: Operators who value GUI-driven management and monitoring
View on GitHub โEvaluation checklist
Evaluation checklist
0 of 5 completed
I am evaluating this OpenClaw bundle/wrapper for use on a production server.
Repo URL: [paste URL here]
Please provide:
1. Plain-language summary of what this project does
2. Claimed features vs verifiable evidence in the repo
3. Security red flags (network exposure, secrets handling, permissions)
4. Operational lock-in points (migration difficulty, custom formats)
5. Update/maintenance health signalsBare OpenClaw vs bundle
| Bare OpenClaw | Bundle | |
|---|---|---|
| Setup speed | Slower โ manual configuration | Faster โ automated/templated |
| Transparency | Full โ you configure everything | Partial โ review what it installs |
| Flexibility | Maximum โ any architecture | Limited by bundle's opinions |
| Maintenance | You own all updates | Depends on bundle maintainer |
| Best for | Maximum control, custom setups | Time-to-value, standard patterns |
Bare OpenClaw
- Setup speed
- Slower โ manual configuration
- Transparency
- Full โ you configure everything
- Flexibility
- Maximum โ any architecture
- Maintenance
- You own all updates
- Best for
- Maximum control, custom setups
Bundle
- Setup speed
- Faster โ automated/templated
- Transparency
- Partial โ review what it installs
- Flexibility
- Limited by bundle's opinions
- Maintenance
- Depends on bundle maintainer
- Best for
- Time-to-value, standard patterns
OpenClaw Hardware Ecosystem
๐ Coming SoonThis section is coming soon.
Preview of topics:
- โขWhat "OpenClaw hardware" means (official vs community)
- โขWhen hardware-first setups make sense
- โขDedicated hardware options: mini-PC, Mac mini, Pi-class
- โขTradeoffs: reliability, power/network, maintenance
- โขEvaluate-before-buy checklist
Get notified when it's ready:
OpenClaw Workflows: Deterministic Recurring Automation
๐ Coming SoonThis section is coming soon.
Preview of topics:
- โขWorkflow primitives: cron jobs, heartbeat loops, hooks, webhooks
- โขDeterministic vs agentic flows
- โขRecurring task patterns (daily brief, inbox triage, reports)
- โขSession design for workflows
- โขCost/safety controls for recurring automations
Get notified when it's ready:
OpenClaw Nodes: Distributed Capabilities in One Instance
OpenClaw is easiest to reason about when you separate roles clearly.
= control plane (sessions, channels, routing, policies). = capability host (camera, canvas, screen, location, system commands). A node is a companion device that connects to the same Gateway WebSocket with role: node and advertises command claims.
Why nodes exist
Nodes solve one practical problem: your best assistant brain might run in the cloud, but useful capabilities often live on local devices. Without nodes, a VPS gateway can only act on VPS-local resources. With nodes, one gateway can orchestrate local desktop/browser/screen capabilities, phone camera/location/voice capabilities, and remote machine command execution via a node host.
VPS gateway + desktop-as-node: what it enables
This is one of the highest-leverage setups for serious users. The VPS Gateway stays always-on for channels, memory, and routing. The desktop node host runs locally and contributes local capabilities on demand. It enables patterns like cloud-hosted agent triggering commands on your desktop, local browser/canvas/camera usage while keeping the main runtime in the VPS, and centralized policy with distributed execution surfaces.
Message arrives
Message arrives at Gateway via Telegram, WhatsApp, Discord, or another channel.
Agent decides
Agent decides to call a node capability.
Gateway forwards
Gateway forwards node.invoke to the paired node.
Node executes
Node executes locally and returns result to Gateway.
Reply sent
Gateway replies back to the original chat surface.
How secure is this architecture?
Short answer: strong when configured deliberately; risky when over-permitted. Nodes add power and therefore expand attack surface.
Core control layers
Gateway auth
Token/password/device auth controls who can reach the control plane.
Device pairing
New node identities create pending device requests that must be approved.
Node command policy
Allow/deny policy controls which commands a node can advertise.
Exec approvals
exec-approvals.json on the node host controls what can actually run locally.
Per-agent tool policy
Controls which agents can call node/exec tools.
Channel access policy
Controls who can influence the agent through inbound channels.
Pairing, auth, and approvals
openclaw devices list
openclaw devices approve <requestId>
openclaw devices reject <requestId>
openclaw nodes statusNew node identities create pending device requests (role: node) that must be approved. Use 'openclaw devices list' to see pending requests and 'openclaw devices approve' to grant access. Reject unknown requests promptly.
Platform capabilities
Platform support differs by command family and runtime state. iOS/Android camera and canvas actions are foreground-only; background calls can fail. system.run requires both node support and approval/allowlist satisfaction.
| macOS | iOS | Android | Headless | |
|---|---|---|---|---|
| Process type | Desktop app (node mode) | Mobile app | Mobile app | CLI (openclaw node run) |
| Camera access | Yes | Foreground only | Foreground only | No |
| Canvas/screen | Yes | Foreground only | Foreground only | No |
| system.run | Yes (exec approvals) | No | No | Yes (exec approvals) |
| Limitations | OS permissions required | Background restrictions | Background + permission toggles | No GUI capabilities |
macOS
- Process type
- Desktop app (node mode)
- Camera access
- Yes
- Canvas/screen
- Yes
- system.run
- Yes (exec approvals)
- Limitations
- OS permissions required
iOS
- Process type
- Mobile app
- Camera access
- Foreground only
- Canvas/screen
- Foreground only
- system.run
- No
- Limitations
- Background restrictions
Android
- Process type
- Mobile app
- Camera access
- Foreground only
- Canvas/screen
- Foreground only
- system.run
- No
- Limitations
- Background + permission toggles
Headless
- Process type
- CLI (openclaw node run)
- Camera access
- No
- Canvas/screen
- No
- system.run
- Yes (exec approvals)
- Limitations
- No GUI capabilities
openclaw nodes status
openclaw nodes describe --node <idOrNameOrIp>
openclaw approvals get --node <idOrNameOrIp>Recommended security posture for node deployments
Recommended security posture for node deployments
0 of 6 completed
When VPS + nodes is a great fit
- โAlways-on cloud control plane for channels, memory, and routing
- โLocal-device capability access (camera, screen, file system, commands)
- โExplicit operator-controlled security gates at every layer
Bad fit if you want zero operational responsibility or no policy tuning.
- โขNodes overview
- โขNode host CLI
- โขNodes CLI
- โขPairing
- โขGateway protocol
- โขSecurity
- โขVPS guide
Skills: Top 20 Useful Skills
๐ Coming SoonThis section is coming soon.
Preview of topics:
- โขSelection criteria for useful skills
- โขTop 20 shortlist with descriptions
- โขSkill hygiene and maintenance
Get notified when it's ready:
Dashboards: Default vs Custom
๐ Coming SoonThis section is coming soon.
Preview of topics:
- โขDefault Control UI strengths
- โขWhen custom dashboards are worth it
- โขCommon dashboard patterns for operators
Get notified when it's ready:
Network Guide (Practical)
OpenClaw networking is easiest to reason about if you separate three roles clearly. Big-picture rule: keep the gateway private by default, then add remote access deliberately.
= the single brain/control plane (sessions, auth, routing, channels). Clients = humans and apps connecting to that gateway. = peripheral devices that expose capabilities (camera, canvas, system) to the gateway.
The mental model first (before config)
- โขThere should be one authoritative gateway per trust boundary.
- โขMessages arrive at the gateway (Telegram/WhatsApp/Discord/Slack), not at nodes.
- โขRouting back out is deterministic to the inbound channel.
- โขSession state lives on the gateway host; UIs are just clients to that state.
Safe default architecture
Loopback bind
Set gateway.bind to loopback. Only processes on the same machine can connect directly.
Strong auth
Set a strong gateway auth token or password. Never leave auth empty on any network-reachable instance.
Channel pairing
Enable pairing and allowlists for inbound channels. Unknown senders should not be processed.
Remote via tunnel
Access remotely via SSH tunnel or Tailscale Serve, not by opening the gateway to the public internet.
# gateway.yaml
gateway:
bind: "loopback"
auth:
token: "your-strong-token-here"
channels:
dmPolicy: "pairing"Remote access patterns
Keep gateway loopback-only. Tunnel a local port to the remote gateway port over SSH. All traffic encrypted through your SSH connection.
Universal fallback. Best when you want explicit, low-magic access control. Works everywhere SSH works.
Low โ no public exposure, requires SSH key access
ssh -L 18789:127.0.0.1:18789 user@your-vpsNodes and network boundaries
Nodes are not mini-gateways; they are attached execution surfaces. Pairing a node is separate from granting it exec approvals. Gateway auth controls who can reach the control plane. Node approvals/allowlists control what can run on that node. A cloud gateway + home node is valid and common, but expands boundary surface.
Discovery and transport gotchas
- โขLocal discovery (Bonjour/mDNS) helps convenience but can hide assumptions about reachability.
- โขTailnet/LAN addressability differs from localhost behavior.
- โข"Works local, fails remote" usually means bind/auth/tunnel mismatch, not a model issue.
- โขFor remote CLI calls with explicit --url, pass explicit credentials too.
Docker/network realities
Common failure patterns
Connection established but all requests return 401/403 or are silently dropped.
Token/password mismatch, missing pairing approval, or wrong auth mode configured.
Verify auth token matches between client and gateway config. Check pairing status with 'openclaw pairing list'. Ensure auth mode is consistent.
Practical network rollout sequence
Start loopback
Start with loopback-only gateway + one channel. Verify everything works locally first.
Verify pairing
Verify DM pairing and /status in local scenario. Confirm auth is working correctly.
Add remote access
Add remote access via SSH tunnel or Tailscale Serve. Test from a separate device.
Add group policies
Add group policies and mention gating. Test with real group messages.
Add nodes
Add nodes only after gateway auth + routing is stable. Pair deliberately.
Re-verify
Re-run network/security checks after every topology change. Use openclaw security audit --deep.
Rollout verification
0 of 7 completed
Security Hardening Guide
๐ Coming SoonThis section is coming soon.
Preview of topics:
- โขCritical OpenClaw settings to lock first
- โขSkill/tool permission hygiene
- โขPrompt-injection defense patterns
- โขTool/app boundary security (incl. KeepAI)
Get notified when it's ready:
Robustness Patterns
๐ Coming SoonThis section is coming soon.
Preview of topics:
- โขAnti-loop controls
- โขAnti-context-blowup patterns
- โขRetries/timeouts/failure handling
- โขBasic runbook checklist
Get notified when it's ready:
Memory, Plans, and Workspace Organization
๐ Coming SoonThis section is coming soon.
Preview of topics:
- โขMemory layers and usage patterns
- โขPlan files (QMD/checklists/notes)
- โขWorkspace structures that scale
Get notified when it's ready:
Multi-Agent Patterns
๐ Coming SoonThis section is coming soon.
Preview of topics:
- โขWhen multi-agent helps (and hurts)
- โขRole partitioning and handoff contracts
- โขShared memory and coordination pitfalls
Get notified when it's ready:
Recommended Starter Blueprints
๐ Coming SoonThis section is coming soon.
Preview of topics:
- โขBeginner blueprint
- โขBuilder blueprint
- โขTeam/ops blueprint
Get notified when it's ready:
Ecosystem Variations and Forks
๐ Coming SoonThis section is coming soon.
Preview of topics:
- โขHow to evaluate a variation without hype
- โขPortability and lock-in checks
- โขSecurity/update ownership checks
- โขWrapper vs fork vs skin: practical differences
Get notified when it's ready:
7-Day Implementation Checklist
๐ Coming SoonThis section is coming soon.
Preview of topics:
- โขDay-by-day rollout plan
- โขMilestones and success criteria
Get notified when it's ready:
Appendix
๐ Coming SoonThis section is coming soon.
Preview of topics:
- โขFull searchable glossary
- โขLinks to official docs
- โขTroubleshooting index
Get notified when it's ready: