Skip to content

netclaw-dev/netclaw

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

551 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Netclaw

Run your own agent.
Simple, secure, reliable agents.

Website · Documentation · Releases · Discord

Netclaw

Netclaw is an open-source, self-hosted autonomous operations agent that runs anywhere — from a Raspberry Pi to a cloud VM. Built on top of a minimal actor-driven session framework called Akka.Agents, Netclaw is designed for hobbyists, small teams, and businesses who want an AI operations agent with strong safety defaults and as few moving parts as possible.

Your data stays on your infrastructure. Your agent keeps running when a provider changes their pricing. You control what gets approved and what runs autonomously — small models welcome.

Where other agents compete on ecosystem breadth and feature velocity, Netclaw takes the opposite approach: simplicity (a readable codebase with a small configuration footprint), security (audience dispositions and approval gates from day one, not bolted on after incidents), and reliability (curated skill feeds managed by your organization, not an unaudited public marketplace).

Learn more at netclaw.dev.

How It Works

Netclaw uses a daemon + thin client architecture:

  • netclawd — an always-on background daemon that hosts LLM sessions, tool execution, and persistence. Start it once and it stays running.
  • netclaw — a lightweight CLI for interactive chat, daemon management, and configuration. It connects to the running daemon over a local socket.

You start the daemon, then use the CLI to talk to it. Remote devices can pair with the daemon over Tailscale or Cloudflare Tunnel for access from anywhere.

Quick Start

Prerequisites

Install

Linux (installs CLI + daemon to ~/.netclaw/bin):

curl -sSL https://releases.netclaw.dev/install.sh | bash
# Install only the CLI or only the daemon
curl -sSL https://releases.netclaw.dev/install.sh | bash -s -- cli
curl -sSL https://releases.netclaw.dev/install.sh | bash -s -- daemon

# Pin a specific version
NETCLAW_VERSION=0.17.1 curl -sSL https://releases.netclaw.dev/install.sh | bash

Windows (installs to %LOCALAPPDATA%\Programs\netclaw):

iwr -useb https://releases.netclaw.dev/install.ps1 | iex

Docker (multi-arch: amd64/arm64):

docker run -d --name netclawd \
  -p 5199:5199 \
  -v ~/.netclaw:/home/netclaw/.netclaw \
  -e NETCLAW_Daemon__Host=0.0.0.0 \
  -e NETCLAW_Daemon__ExposureMode=reverse-proxy \
  -e NETCLAW_Daemon__TrustedProxies__0=172.16.0.0/12 \
  ghcr.io/netclaw-dev/netclaw:latest

See the Docker deployment guide for volume setup, environment variables, and Docker Compose examples.

For the full installation reference (including building from source), see the installation docs.

Configure

Run the guided setup wizard:

netclaw init

Or create the config manually. The daemon reads layered config from ~/.netclaw/config/:

~/.netclaw/config/netclaw.json — base settings (minimal Ollama example):

{
  "configVersion": 1,
  "Providers": {
    "local-ollama": {
      "Type": "ollama",
      "Endpoint": "http://localhost:11434"
    }
  },
  "Models": {
    "Main": { "Provider": "local-ollama", "ModelId": "qwen3:30b" }
  }
}

Credentials are stored encrypted in ~/.netclaw/config/secrets.json. Use the CLI to manage them — never edit that file by hand:

netclaw secrets set Providers.openrouter.ApiKey sk-or-v1-...
netclaw secrets set Slack.BotToken xoxb-...

All settings can also be overridden via environment variables using the NETCLAW_ prefix with double-underscore separators for nested keys:

export NETCLAW_Providers__local-ollama__Endpoint=http://localhost:11434
export NETCLAW_Models__Main__ModelId=qwen3:8b

For the full configuration reference, see the configuration docs.

Validate

netclaw doctor          # Check config schema, provider connectivity, secrets
netclaw doctor --fix    # Auto-apply safe fixes

Run

# Start the daemon (background process)
netclaw daemon start

# Check daemon status
netclaw daemon status

# Interactive chat (connects to running daemon)
netclaw chat

# Single-prompt mode (non-interactive)
netclaw chat -p "What's on my calendar today?"

# Stop the daemon
netclaw daemon stop

For the full quickstart walkthrough, see the quickstart guide.

Channels

Netclaw connects to your team's existing communication channels:

  • Slack — Socket Mode gateway with per-channel audience controls
  • Discord — Guild and DM support

Deployment

  • Docker — multi-arch images on GHCR (ghcr.io/netclaw-dev/netclaw)
  • systemdnetclaw daemon install creates a user-level service
  • Exposure Modes — local, Tailscale, or Cloudflare Tunnel

Security

Netclaw is default-deny from the ground up. The daemon requires explicit configuration before it will execute tools, connect to channels, or accept remote connections.

CLI Reference

Full CLI documentation is available at netclaw.dev/cli.

netclaw init                     First-run setup wizard
netclaw chat                     Interactive TUI chat
netclaw chat -p <text>           Headless single-prompt mode
netclaw doctor                   Configuration diagnostics
netclaw daemon start|stop|status Manage the daemon process
netclaw daemon install           Install systemd user service (Linux)
netclaw daemon pair              Generate a pairing code for remote access
netclaw provider                 Manage LLM providers
netclaw model                    Manage model assignments
netclaw mcp                      Manage MCP server profiles
netclaw skill                    Manage skills and skill sources
netclaw reminder                 Manage scheduled reminders
netclaw webhooks                 Manage inbound webhook routes
netclaw secrets set <k> <v>      Manage encrypted secrets
netclaw update                   Check for and install updates
netclaw version                  Show CLI version

Documentation

Visit netclaw.dev/docs for the full documentation, including:

  • Getting Started — installation, quickstart, first conversation
  • Configuration — providers, models, MCP servers, webhooks, reminders
  • Skills — skill system, skill feeds, authoring custom skills
  • Guides — Slack setup, MCP permissions, remote pairing
  • Architecture — system design and security model
  • Observability — health checks, alerts, OpenTelemetry

Contributing

See CONTRIBUTING.md for development workflows, build instructions, project structure, and contributor tooling.

License

Netclaw is licensed under the Apache License, Version 2.0. See LICENSE for the full text.


Built with care by Petabridge. Visit netclaw.dev for documentation, guides, and community resources.

About

Simple, secure, reliable agents. Self-hosted. Open source. Built with .NET.

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Packages

 
 
 

Contributors