Skip to content

OpenClaw Starter Guide

9 chapters live ยท 11 more coming ยท Last updated: March 2026

What's inside

  • โœ“OpenClaw vs Claude vs Others
  • โœ“Cheapest LLM providers
  • โœ“60+ hosting options
  • โœ“37 prompts for real use cases
  • โœ“25 essential skills
  • โœ“5 best memory plugins

Let's dive in!

1

What OpenClaw Is (and Why People Get Excited About It)

You might be thinking

I keep hearing about OpenClaw and AI agents, but what would I actually do with one?

If that's where you are โ€” good. That's the right place to start.

The simple idea

OpenClaw lets you run your own AI assistant and talk to it through normal like , , , , and others โ€” instead of keeping it trapped in one browser tab.

But channels are just the starting point. OpenClaw can also run scheduled and recurring tasks via , emulate proactive behavior through so the assistant checks on things without being asked, and connect your phones, laptops, and other devices as โ€” making their cameras, screens, and local commands available to the agent through a single .

That "gateway" word you'll see a lot just means this: a bridge that makes your assistant reachable where your actual life already happens.

OpenClaw is fully โ€” you can read every line of code, audit the security model, and contribute. It went from zero to the #1 most-starred project on GitHub in about four months, which is unprecedented for any software project.

Why this matters in practice

With OpenClaw

Reach
Message it from Telegram while walking the dog
Context
Picks up where you left off โ€” across days and devices
Scheduling
Cron job briefs you every morning with what matters
Proactivity
Heartbeat checks your inbox and flags what's urgent
Devices
Phone camera, desktop files, server CLI โ€” all reachable
Tools
Chain skills: draft in Notion, review in Slack, file in Drive
Ownership
Your setup, your data, your rules โ€” runs on your hardware

Without OpenClaw

Reach
Open a browser tab when you remember
Context
Copy-paste the same background every time
Scheduling
Set a reminder and do the task yourself
Proactivity
You have to ask every single time
Devices
Works on one screen in one browser
Tools
One-off tasks, one at a time
Ownership
Locked into one vendor's product roadmap

What OpenClaw is not

  • โ€ขIt's not "the best model." You choose models/providers separately.
  • โ€ขIt's not just a chatbot UI.
  • โ€ขIt's not magic autonomy that replaces judgment.

Think of it as infrastructure that makes an assistant usable, portable, and extensible.

Where OpenClaw is a great fit

You own it

Your setup, your data paths, your rules.

In your apps

Assistant available in the channels you already use.

You tweak it

Ability to add tools, skills, and automations as needs grow.

Community drives it

Not tied to one app vendor's product direction.

Where OpenClaw is a bad fit (for now)

If this is what you expect, OpenClaw might be a misfit:

  • โ€ขA ready-made product that works out of the box with zero setup or maintenance.
  • โ€ขA consumer app you install once and never think about again.
  • โ€ขSomething that makes all the decisions for you โ€” models, security, channels โ€” without your input.

None of that is a flaw in OpenClaw โ€” it's a fit question. If you want full control, you'll need to make some choices. This guide is here to make them fast and painless.

A practical expectation to set up front

OpenClaw gives you leverage, not instant perfection. The payoff is long-term: once configured well, it can become a serious personal operating layer. But the first setup still needs decisions (hosting, model provider, channels, safety boundaries). This guide exists to make those decisions clear and fast.

Before you dive in: a security reality check

OpenClaw is powerful, fast-moving, alpha-stage software. It can execute commands, read files, send messages, and access APIs on your behalf. That power comes with real risk.

  • โ€ขIt processes input from untrusted sources โ€” messages, emails, web content โ€” making it vulnerable to prompt injection attacks.
  • โ€ขLLMs can misuse tools in unexpected ways, especially with broad permissions or weak models.
  • โ€ขA misconfigured setup can expose personal files, credentials, or connected services.

Don't rush. Read the security sections of this guide before granting broad access. Start with minimal permissions and expand deliberately. The time you spend thinking about boundaries now will save you from real incidents later.

How to read this guide

Read sections 1 through 5 first to build a solid foundation. ยง1 โ†’ ยง2 โ†’ ยง3 โ†’ ยง4 โ†’ ยง5

Subscribe

20 chapters covering hosting, models, channels, security, and more. Get notified as new sections drop.

Join 1,200+ operators getting guide updates

2

Where OpenClaw Fits Among Today's AI Assistants

You might be thinking

Do I actually need OpenClaw, or should I just use ChatGPT / Claude / Codex / Copilot / Manus?

That is exactly the right question. These tools overlap, but they are not trying to solve the exact same problem.

The practical difference most people feel first

The biggest day-1 difference is simple: can this assistant meet you in the apps you already use every day, or does it mostly live inside its own official interface?

A second practical difference is built-in proactive behavior. OpenClaw can run periodic turns and precise , so the assistant can check things in the background and surface only what matters.

How OpenClaw compares

OpenClaw

Primary strength
Channel-native agent
Channel reach
Telegram, WhatsApp, Discord, Slack, +
Self-hostable
Yes (core feature)
Customization depth
Full (tools, skills, config)
Best for
Long-term personal agent

ChatGPT

Primary strength
General assistant
Channel reach
Own app + API
Self-hostable
No
Customization depth
Limited (GPTs)
Best for
Quick answers

Claude

Primary strength
Coding/office work
Channel reach
Own app + API
Self-hostable
No
Customization depth
High (skills, hooks)
Best for
Complex tasks

Copilot

Primary strength
Code assistant
Channel reach
IDE + GitHub
Self-hostable
No
Customization depth
Extensions
Best for
Coding workflows

Manus

Primary strength
Vibe-coding
Channel reach
Own app
Self-hostable
No
Customization depth
Limited
Best for
Quick prototypes

Which AI agent is the best?

This market changes every week. Instead of pretending there is one universal winner, use this as a fit check.

  • โ†’If you want the fastest start and minimal setup, commercial agents are often the right first move.
  • โ†’If you want one assistant you can shape, route, and run in your own environment and channels, OpenClaw is often the better long-term path.
  • โ†’A hybrid path is normal: start with commercial agents for speed, then move into OpenClaw when control and channel reach become real constraints.

OpenClaw ecosystem momentum

322k+

GitHub stars

62k+

Forks

0 โ†’ #1

GitHub rank in 4 months

1.5k+

Watchers

OpenClaw became the most popular open-source project on GitHub in 4 months. The numbers above don't guarantee it's "best", but they signal real operators are stress-testing the ecosystem in production-like conditions.

3

Deployment Choices: Local vs Dedicated Hardware vs VPS vs Docker

The first deployment question is not "what is easiest?" It is: what can this access if it gets tricked, misbehaves, or makes a mistake?

OpenClaw can process external input (messages, web content, email, tools). That means and tool misuse are real operational risks, not edge cases. So your deployment choice is mainly a decision.

The security-first mental model

1

Trust boundary

What data/systems must never be reachable?

2

Power level

Should the agent have shell/file/network/tool access, and how much?

3

Exposure surface

Which inbound channels/tools can feed untrusted input?

4

Operational tolerance

How much setup/admin burden can you actually maintain?

If you skip this and start with "quickest install," you usually pay later.

Quick compare (with risk lens)

Best for

Controlled experiments with minimal privileges

Main risk

Accidental access to personal files, tokens, browser sessions, SSH keys

Use only if

You intentionally sandbox/restrict tools, isolate user/workspace, and understand host permissions

Bottom line

High convenience, potentially high consequence

Practical default recommendations

  • โœ“If the agent gets broad shell/tool access: prefer dedicated hardware or isolated VPS over your personal laptop.
  • โœ“If you want fastest path with lower infra burden: consider managed hosting, then migrate later.
  • โœ“If you run local anyway: treat it as high-risk unless heavily restricted.

Common failure modes

  • โœ—Granting powerful tools before defining trust boundaries
  • โœ—Running on a personal machine with sensitive data and broad shell access
  • โœ—Assuming prompt-injection is theoretical
  • โœ—Exposing gateway/network surface before hardening auth + access path
  • โœ—Confusing Docker with security architecture

Find Your Deployment Path

Will the agent have shell or tool access?

4

Hosting Options: Managed Providers vs Raw VPS

This section helps you choose a hosting path in minutes. The choice is not just about hosting โ€” it is a control vs responsibility decision.

Managed vs Raw VPS: what you are actually choosing

With managed providers, you pay to remove operational burden: faster setup, fewer infra tasks, and often a cleaner admin experience. With a raw VPS, you keep maximum control over runtime, upgrades, security posture, and portability โ€” but you own every mistake and every maintenance task.

Neither is universally better. The right choice depends on your trust model, time budget, and tolerance for infrastructure work.

Managed

Setup speed
Fast โ€” often one-click or wizard
Operational burden
Provider handles updates, patches, backups
Control depth
Limited by provider (dashboard-only or partial SSH)
Security transparency
Varies โ€” some providers are opaque
Lock-in risk
Higher โ€” migration effort varies by provider
Cost model
Monthly subscription (predictable)

Raw VPS

Setup speed
Slower โ€” manual config and hardening
Operational burden
You own everything: updates, backups, monitoring
Control depth
Full: SSH, filesystem, network, config
Security transparency
Full visibility into what runs and where
Lock-in risk
Lower โ€” standard OpenClaw install, portable
Cost model
VPS/hardware cost + your time (variable)

The practical tradeoff

Managed hosting is usually better when:

  • +You want to launch quickly
  • +You do not want to run SSH/server ops daily
  • +You value bundled UX/features over raw control

Raw VPS is usually better when:

  • +You need strict control over security/networking
  • +You want predictable portability and low lock-in risk
  • +You can operate updates/backups/monitoring yourself
A useful rule: if your biggest fear is "I don't want to run infrastructure," go managed. If your biggest fear is "I can't verify what the provider is doing," go raw VPS.

Managed hosting provider directory

103 tracked providers

Simen

simen.ai

Deploy your OpenClaw AI agent in 60 seconds โ€” no coding, no servers. Automate email, scheduling & more via WhatsApp or Slack. Start free today.

From $1/moVisit

Hostinger

hostinger.com

Choose Hostinger and make the perfect site. From Shared Hosting and Domains to VPS and Cloud plans. We have all you need for online success.

From $1.99/moVisit

xCloud

xcloud.host

Unlock xCloud - the next-gen managed hosting panel for WordPress and server management to automate setup & maximize performance.

From $3/moVisit

RunClaw

runclaw.ai

Deploy an SSH key-secured OpenClaw bot in 5 minutes. Docker-sandboxed, UFW firewall, fail2ban, auto-updated, fully managed.

From $3.49/moVisit

OpenClaw Setup

openclaw-setup.me

Managed OpenClaw hosting with built-in chat, file uploads, Telegram/Slack/WhatsApp, and per-model cost tracking.

From $3.9/moVisit

Blink Claw

blink.new

Run OpenClaw without Docker, a VPS, or separate AI accounts. One-click deployment, 200+ AI models included, unlimited agents, always-on.

From $4/moVisit

KiloClaw

kilo.ai

Your personal AI agent, managed and secured by Kilo. Deploy OpenClaw in seconds with 500+ models, enterprise security, and zero DevOps.

From $4/moVisit

ClawSimple

clawsimple.com

Managed OpenClaw hosting for Telegram bots with BYOK on every paid plan, official Telegram bot support, secure runtime defaults, and multiple agents per server.

From $4.92/moVisit

OpenClaw Cloud (setupopenclaw)

setupopenclaw.com

Get OpenClaw (formerly Clawdbot/Moltbot) running in 60 seconds. No terminal, no VPS management. Fully managed AI assistant with free LLM, 15+ skills pre-installed.

From $5/moVisit

EasyClaw Pro

easyclaw.pro

EasyClaw makes OpenClaw deployment one click. Connect Telegram, Discord, or WhatsApp, choose Claude, GPT, or Gemini, and go live in under 1 minute.

From $5/moVisit

OpenClaw AI

openclawd.ai

OpenClaw AI - Open-source personal intelligence system running on your hardware. Deploy on Mac mini, Windows, or Linux. Formerly named Clawdbot and Moltbot.

From $5/moVisit

Klaus

klausai.com

Your AI employee in five minutes. Secure OpenClaw in the cloud with every model, hundreds of integrations, and all your accounts. Trusted by hundreds of businesses.

From $7/moVisit

Where to start?

A

Start managed, move to raw VPS later

Launch fast, learn what matters, then migrate when control becomes a constraint.

B

Start with raw VPS, offload to managed later

Build expertise first, then offload ops when time becomes the bottleneck.

Either way, keep your OpenClaw config and workspace portable from day one.

5

LLM Provider Strategy: Cost, Reliability, and Risk

Model choice is not just about quality. In OpenClaw, it directly affects operating cost, tool-use reliability, and security posture.

Cheapest path to top-tier models

For many users, the lowest-cost way to run strong models is to connect OpenClaw to an existing subscription rather than pure pay-per-token APIs.

Subscription connectors (OpenAI/Codex subscription auth, GitHub Copilot auth) can be dramatically cheaper than heavy pay-per-token usage when you run an always-on assistant.

Important caveat: subscription connectors are policy-dependent

Treat subscription connectors as high-leverage but not guaranteed forever. Provider auth flows, rate limits, and external-tool policies can change. Keep a fallback provider configured, avoid building mission-critical workflows on a single unofficial auth path, and re-check provider docs quarterly.

OpenAI vs Anthropic posture

OpenAI is currently more explicit about supporting usage in OpenClaw. Anthropic works well via API key but is explicitly against usage in OpenClaw. This is not ideology; it is an operational observation. Re-validate over time because provider posture can shift.

OpenRouter and pay-per-token aggregators

is excellent for model breadth and fast experimentation, but high-usage assistants can get expensive fast under pure token billing.

API-key direct

Cost model
Pay per token
Model breadth
One provider's models
Cost predictability
Variable โ€” depends on usage
Policy risk
Low โ€” official API usage
Best for
Production reliability

Subscription connector

Cost model
Flat subscription fee
Model breadth
One provider's models
Cost predictability
Predictable monthly cost
Policy risk
Medium โ€” policies can change
Best for
Cost-sensitive high usage

OpenRouter

Cost model
Pay per token (aggregated)
Model breadth
Many providers, many models
Cost predictability
Variable โ€” can spike with heavy use
Policy risk
Low โ€” designed for external use
Best for
Exploration and model switching
Using weak models to save money can backfire: worse prompt-injection resistance, weaker tool judgment, higher chance of unsafe tool calls. If an agent has meaningful tool/shell/email/web power, use a stronger model. Reserve weaker/cheaper models for narrow, low-impact tasks only.

Local models: powerful but advanced-only

Local LLM setups are for advanced operators who can manage hardware, latency, context limits, and model quality tradeoffs. Local can reduce external API cost, but weaker locally hosted models can reduce safety/reliability for tool-using agents.

The easiest local model runner. Great for quick experimentation. Supports a wide range of models with simple pull-and-run commands.

https://ollama.com/ โ†’

Recommended starter patterns

Primary path

Subscription connector (OpenAI/Codex or Copilot)

Fallback

API-key fallback (OpenAI or Anthropic)

Key tradeoff

Cheapest high-quality path, but connector policies can change

6

Channel Strategy: Telegram vs WhatsApp vs Slack vs Discord

OpenClaw is primarily designed as a personal agent (one trusted operator boundary), not a hostile multi-tenant system by default. Channel strategy is a security design task first, then a UX decision.

Baseline safety posture (before adding channels)

Baseline safety posture (before adding channels)

0 of 5 completed

Security audit commands
openclaw security audit --deep
openclaw security audit --fix

Quick fit guide

Telegram

Best for
Solo operators, fast setup
Setup difficulty
Easy (bot token)
Group support
Groups + forum topics
Command UX
Strong native
Main caveat
Bot API limits

WhatsApp

Best for
Personal daily usage
Setup difficulty
Medium (QR link)
Group support
Groups (JID-based)
Command UX
Basic
Main caveat
Linked account (not Business API)

Discord

Best for
Multi-room workflows
Setup difficulty
Medium (bot app + intents)
Group support
Guilds + channels + threads
Command UX
Strong native
Main caveat
Permission complexity

Slack

Best for
Workplace environments
Setup difficulty
Hard (app + scopes + config)
Group support
Channels + threads
Command UX
Manual slash setup
Main caveat
Heaviest config overhead

Pairing and access model

Across major channels, DMs typically default to policy: unknown senders get a code, messages are not processed until approved, and codes expire (roughly 1 hour).

Pairing commands
openclaw pairing list <channel>
openclaw pairing approve <channel> <CODE>

The key risk in shared inboxes is cross-user context/data bleed. Default behavior (session.dmScope: "main") can collapse multiple DMs into one main session per agent. That is acceptable for one trusted operator, but risky when multiple people can DM the same agent.

All DMs share one session per agent. Fine for single trusted operator. Risky for multi-user setups.

Use when

You are the only person who will DM this agent.

Context bloat and token burn

Usage monitoring commands
/usage tokens
/usage full
/usage cost
/status
/context detail
These are cross-surface gateway commands (not Telegram-only). Telegram and Discord have the strongest native command UX. Slack requires manual slash setup, but text commands still work.

How group chats work

Group sessions isolate by chat ID; forum topics append :topic:<id>. Per-topic agentId routing is supported. Security controls: groups allowlist, groupPolicy, allowFrom, requireMention.

Recommended rollout order

1

Start with one channel

Telegram or WhatsApp for most personal setups.

2

Lock DM policy + allowlists

Configure pairing and access controls before anything else.

3

Set dmScope explicitly

Choose the right isolation level for your trust boundary.

4

Enable usage visibility

Run /usage tokens or /usage full to monitor costs early.

5

Add group/channel access

Only after permissions and mention gating are verified.

6

Add second channel

Only after cost + policy behavior is stable on the first.

Step-by-step: adding OpenClaw to a group

Each channel has its own bot/account identity. You add that identity to groups using native platform controls. That identity does not always map to exactly one agent โ€” OpenClaw can dynamically route inbound messages to different agents based on bindings and policies.

1

Connect one channel identity

Configure bot token via BotFather

2

Add identity to target group

Add bot to group or supergroup

3

Configure access policy

Set dmPolicy, groupPolicy, groups allowlist, requireMention

4

Test engagement rules

With requireMention: true, only @mentions trigger processing. With requireMention: false and authorized sender, regular messages trigger. Unauthorized senders are always ignored.

5

Verify agent routing

OpenClaw resolves one agent per message using routing precedence: exact peer match, then parent/thread inheritance, then guild/team/account bindings, then default agent fallback.

6

Verify session isolation

DMs use dmScope setting. Groups/channels isolate by channel + group ID. Threads/topics get additional isolation suffixes.

7

Confirm reply routing

Replies go back to the same inbound channel deterministically. The model does not choose the outbound channel.

7

Bundles & Wrappers: Bare OpenClaw vs Packaged Offerings

You can self-host OpenClaw without building everything manually from scratch. A bundle or installer is a community-maintained layer around OpenClaw that prepackages some combination of host hardening, setup automation, prefilled config templates, dashboards, and multi-agent conventions.

What bundles are

Bundles trade flexibility for speed. They are most useful for local dedicated hardware (Mac mini, Pi, mini-PC), raw VPS setups where you want fewer manual steps, and teams who want operational defaults quickly. They are less useful when you need fully custom architecture from day one.

Three examples

Security-first automation for Debian/Ubuntu servers. Includes firewall setup, Tailscale/VPN patterns, and a hardened install flow.

Best for: Operators who want reproducible, security-conscious server setup

View on GitHub โ†’

Clawdboss

Opinionated multi-agent setup with install wizard, templated workspaces, security posture defaults, and optional tooling stack.

Best for: Users who want a pre-hardened multi-agent environment quickly

View on GitHub โ†’

AlphaClaw

Wrapper/harness approach emphasizing setup UX, operations tooling, watchdog/recovery, and dashboard-style management.

Best for: Operators who value GUI-driven management and monitoring

View on GitHub โ†’
These projects can save serious setup/config time, but they are community-managed and can carry security risk, stale assumptions, opinionated defaults that do not match your threat model, and hidden lock-in or migration friction. Evaluate before running, especially on systems with real credentials or data.

Evaluation checklist

Evaluation checklist

0 of 5 completed

AI-assisted evaluation prompt
I am evaluating this OpenClaw bundle/wrapper for use on a production server.
Repo URL: [paste URL here]

Please provide:
1. Plain-language summary of what this project does
2. Claimed features vs verifiable evidence in the repo
3. Security red flags (network exposure, secrets handling, permissions)
4. Operational lock-in points (migration difficulty, custom formats)
5. Update/maintenance health signals

Bare OpenClaw vs bundle

Bare OpenClaw

Setup speed
Slower โ€” manual configuration
Transparency
Full โ€” you configure everything
Flexibility
Maximum โ€” any architecture
Maintenance
You own all updates
Best for
Maximum control, custom setups

Bundle

Setup speed
Faster โ€” automated/templated
Transparency
Partial โ€” review what it installs
Flexibility
Limited by bundle's opinions
Maintenance
Depends on bundle maintainer
Best for
Time-to-value, standard patterns
8

OpenClaw Hardware Ecosystem

๐Ÿ”’ Coming Soon

This section is coming soon.

Preview of topics:

  • โ€ขWhat "OpenClaw hardware" means (official vs community)
  • โ€ขWhen hardware-first setups make sense
  • โ€ขDedicated hardware options: mini-PC, Mac mini, Pi-class
  • โ€ขTradeoffs: reliability, power/network, maintenance
  • โ€ขEvaluate-before-buy checklist

Get notified when it's ready:

9

OpenClaw Workflows: Deterministic Recurring Automation

๐Ÿ”’ Coming Soon

This section is coming soon.

Preview of topics:

  • โ€ขWorkflow primitives: cron jobs, heartbeat loops, hooks, webhooks
  • โ€ขDeterministic vs agentic flows
  • โ€ขRecurring task patterns (daily brief, inbox triage, reports)
  • โ€ขSession design for workflows
  • โ€ขCost/safety controls for recurring automations

Get notified when it's ready:

10

OpenClaw Nodes: Distributed Capabilities in One Instance

OpenClaw is easiest to reason about when you separate roles clearly.

= control plane (sessions, channels, routing, policies). = capability host (camera, canvas, screen, location, system commands). A node is a companion device that connects to the same Gateway WebSocket with role: node and advertises command claims.

Why nodes exist

Nodes solve one practical problem: your best assistant brain might run in the cloud, but useful capabilities often live on local devices. Without nodes, a VPS gateway can only act on VPS-local resources. With nodes, one gateway can orchestrate local desktop/browser/screen capabilities, phone camera/location/voice capabilities, and remote machine command execution via a node host.

Think of nodes as peripherals attached to a central brain, not mini-gateways.

VPS gateway + desktop-as-node: what it enables

This is one of the highest-leverage setups for serious users. The VPS Gateway stays always-on for channels, memory, and routing. The desktop node host runs locally and contributes local capabilities on demand. It enables patterns like cloud-hosted agent triggering commands on your desktop, local browser/canvas/camera usage while keeping the main runtime in the VPS, and centralized policy with distributed execution surfaces.

Telegramโ†’VPS Gatewayโ†’Desktop Nodeโ†’Local Actionโ†’Resultโ†’Telegram
1

Message arrives

Message arrives at Gateway via Telegram, WhatsApp, Discord, or another channel.

2

Agent decides

Agent decides to call a node capability.

3

Gateway forwards

Gateway forwards node.invoke to the paired node.

4

Node executes

Node executes locally and returns result to Gateway.

5

Reply sent

Gateway replies back to the original chat surface.

How secure is this architecture?

Short answer: strong when configured deliberately; risky when over-permitted. Nodes add power and therefore expand attack surface.

Treat pairing + command policy + exec approvals as layered controls, not optional extras. All three layers must be correct.

Core control layers

1

Gateway auth

Token/password/device auth controls who can reach the control plane.

2

Device pairing

New node identities create pending device requests that must be approved.

3

Node command policy

Allow/deny policy controls which commands a node can advertise.

4

Exec approvals

exec-approvals.json on the node host controls what can actually run locally.

5

Per-agent tool policy

Controls which agents can call node/exec tools.

6

Channel access policy

Controls who can influence the agent through inbound channels.

Critical distinction: the pairing gate controls whether a device can connect as a node. The exec approvals gate controls whether a command can run on that node host. You need both right.

Pairing, auth, and approvals

Device and node management
openclaw devices list
openclaw devices approve <requestId>
openclaw devices reject <requestId>
openclaw nodes status

New node identities create pending device requests (role: node) that must be approved. Use 'openclaw devices list' to see pending requests and 'openclaw devices approve' to grant access. Reject unknown requests promptly.

Platform capabilities

Platform support differs by command family and runtime state. iOS/Android camera and canvas actions are foreground-only; background calls can fail. system.run requires both node support and approval/allowlist satisfaction.

macOS

Process type
Desktop app (node mode)
Camera access
Yes
Canvas/screen
Yes
system.run
Yes (exec approvals)
Limitations
OS permissions required

iOS

Process type
Mobile app
Camera access
Foreground only
Canvas/screen
Foreground only
system.run
No
Limitations
Background restrictions

Android

Process type
Mobile app
Camera access
Foreground only
Canvas/screen
Foreground only
system.run
No
Limitations
Background + permission toggles

Headless

Process type
CLI (openclaw node run)
Camera access
No
Canvas/screen
No
system.run
Yes (exec approvals)
Limitations
No GUI capabilities
Check node capabilities
openclaw nodes status
openclaw nodes describe --node <idOrNameOrIp>
openclaw approvals get --node <idOrNameOrIp>

Recommended security posture for node deployments

Recommended security posture for node deployments

0 of 6 completed

When VPS + nodes is a great fit

  • โ†’Always-on cloud control plane for channels, memory, and routing
  • โ†’Local-device capability access (camera, screen, file system, commands)
  • โ†’Explicit operator-controlled security gates at every layer

Bad fit if you want zero operational responsibility or no policy tuning.

11

Skills: Top 20 Useful Skills

๐Ÿ”’ Coming Soon

This section is coming soon.

Preview of topics:

  • โ€ขSelection criteria for useful skills
  • โ€ขTop 20 shortlist with descriptions
  • โ€ขSkill hygiene and maintenance

Get notified when it's ready:

12

Dashboards: Default vs Custom

๐Ÿ”’ Coming Soon

This section is coming soon.

Preview of topics:

  • โ€ขDefault Control UI strengths
  • โ€ขWhen custom dashboards are worth it
  • โ€ขCommon dashboard patterns for operators

Get notified when it's ready:

13

Network Guide (Practical)

OpenClaw networking is easiest to reason about if you separate three roles clearly. Big-picture rule: keep the gateway private by default, then add remote access deliberately.

= the single brain/control plane (sessions, auth, routing, channels). Clients = humans and apps connecting to that gateway. = peripheral devices that expose capabilities (camera, canvas, system) to the gateway.

The mental model first (before config)

Gatewayโ†”Clientsโ†”Nodes
  • โ€ขThere should be one authoritative gateway per trust boundary.
  • โ€ขMessages arrive at the gateway (Telegram/WhatsApp/Discord/Slack), not at nodes.
  • โ€ขRouting back out is deterministic to the inbound channel.
  • โ€ขSession state lives on the gateway host; UIs are just clients to that state.
If networking feels confusing, usually the confusion is actually role confusion (gateway vs node vs UI). Clarify the role first, then the network config becomes obvious.

Safe default architecture

1

Loopback bind

Set gateway.bind to loopback. Only processes on the same machine can connect directly.

2

Strong auth

Set a strong gateway auth token or password. Never leave auth empty on any network-reachable instance.

3

Channel pairing

Enable pairing and allowlists for inbound channels. Unknown senders should not be processed.

4

Remote via tunnel

Access remotely via SSH tunnel or Tailscale Serve, not by opening the gateway to the public internet.

Safe default config
# gateway.yaml
gateway:
  bind: "loopback"
  auth:
    token: "your-strong-token-here"
  channels:
    dmPolicy: "pairing"

Remote access patterns

How it works

Keep gateway loopback-only. Tunnel a local port to the remote gateway port over SSH. All traffic encrypted through your SSH connection.

When to use

Universal fallback. Best when you want explicit, low-magic access control. Works everywhere SSH works.

Risk level

Low โ€” no public exposure, requires SSH key access

SSH Tunnel
ssh -L 18789:127.0.0.1:18789 user@your-vps

Nodes and network boundaries

Nodes are not mini-gateways; they are attached execution surfaces. Pairing a node is separate from granting it exec approvals. Gateway auth controls who can reach the control plane. Node approvals/allowlists control what can run on that node. A cloud gateway + home node is valid and common, but expands boundary surface.

Treat each new node as additional risk surface, not just new capability. Gateway auth + node pairing + exec approvals must all be correct.

Discovery and transport gotchas

  • โ€ขLocal discovery (Bonjour/mDNS) helps convenience but can hide assumptions about reachability.
  • โ€ขTailnet/LAN addressability differs from localhost behavior.
  • โ€ข"Works local, fails remote" usually means bind/auth/tunnel mismatch, not a model issue.
  • โ€ขFor remote CLI calls with explicit --url, pass explicit credentials too.

Docker/network realities

Docker is optional for OpenClaw gateway deployment. Running gateway in Docker adds network/volume complexity; do it for reproducibility, not by reflex. Sandboxing can use Docker without requiring the entire gateway to run in Docker. On VPS/public hosts, firewall policy matters more than container choice.

Common failure patterns

Symptom

Connection established but all requests return 401/403 or are silently dropped.

Likely cause

Token/password mismatch, missing pairing approval, or wrong auth mode configured.

Fix

Verify auth token matches between client and gateway config. Check pairing status with 'openclaw pairing list'. Ensure auth mode is consistent.

Practical network rollout sequence

1

Start loopback

Start with loopback-only gateway + one channel. Verify everything works locally first.

2

Verify pairing

Verify DM pairing and /status in local scenario. Confirm auth is working correctly.

3

Add remote access

Add remote access via SSH tunnel or Tailscale Serve. Test from a separate device.

4

Add group policies

Add group policies and mention gating. Test with real group messages.

5

Add nodes

Add nodes only after gateway auth + routing is stable. Pair deliberately.

6

Re-verify

Re-run network/security checks after every topology change. Use openclaw security audit --deep.

Rollout verification

0 of 7 completed

14

Security Hardening Guide

๐Ÿ”’ Coming Soon

This section is coming soon.

Preview of topics:

  • โ€ขCritical OpenClaw settings to lock first
  • โ€ขSkill/tool permission hygiene
  • โ€ขPrompt-injection defense patterns
  • โ€ขTool/app boundary security (incl. KeepAI)

Get notified when it's ready:

15

Robustness Patterns

๐Ÿ”’ Coming Soon

This section is coming soon.

Preview of topics:

  • โ€ขAnti-loop controls
  • โ€ขAnti-context-blowup patterns
  • โ€ขRetries/timeouts/failure handling
  • โ€ขBasic runbook checklist

Get notified when it's ready:

16

Memory, Plans, and Workspace Organization

๐Ÿ”’ Coming Soon

This section is coming soon.

Preview of topics:

  • โ€ขMemory layers and usage patterns
  • โ€ขPlan files (QMD/checklists/notes)
  • โ€ขWorkspace structures that scale

Get notified when it's ready:

17

Multi-Agent Patterns

๐Ÿ”’ Coming Soon

This section is coming soon.

Preview of topics:

  • โ€ขWhen multi-agent helps (and hurts)
  • โ€ขRole partitioning and handoff contracts
  • โ€ขShared memory and coordination pitfalls

Get notified when it's ready:

18

Recommended Starter Blueprints

๐Ÿ”’ Coming Soon

This section is coming soon.

Preview of topics:

  • โ€ขBeginner blueprint
  • โ€ขBuilder blueprint
  • โ€ขTeam/ops blueprint

Get notified when it's ready:

19

Ecosystem Variations and Forks

๐Ÿ”’ Coming Soon

This section is coming soon.

Preview of topics:

  • โ€ขHow to evaluate a variation without hype
  • โ€ขPortability and lock-in checks
  • โ€ขSecurity/update ownership checks
  • โ€ขWrapper vs fork vs skin: practical differences

Get notified when it's ready:

20

7-Day Implementation Checklist

๐Ÿ”’ Coming Soon

This section is coming soon.

Preview of topics:

  • โ€ขDay-by-day rollout plan
  • โ€ขMilestones and success criteria

Get notified when it's ready:

Appendix

๐Ÿ”’ Coming Soon

This section is coming soon.

Preview of topics:

  • โ€ขFull searchable glossary
  • โ€ขLinks to official docs
  • โ€ขTroubleshooting index

Get notified when it's ready: