Run your own agent.
Simple, secure, reliable agents.
Website · Documentation · Releases · Discord
Netclaw is an open-source, self-hosted autonomous operations agent that runs anywhere — from a Raspberry Pi to a cloud VM. Built on top of a minimal actor-driven session framework called Akka.Agents, Netclaw is designed for hobbyists, small teams, and businesses who want an AI operations agent with strong safety defaults and as few moving parts as possible.
Your data stays on your infrastructure. Your agent keeps running when a provider changes their pricing. You control what gets approved and what runs autonomously — small models welcome.
Where other agents compete on ecosystem breadth and feature velocity, Netclaw takes the opposite approach: simplicity (a readable codebase with a small configuration footprint), security (audience dispositions and approval gates from day one, not bolted on after incidents), and reliability (curated skill feeds managed by your organization, not an unaudited public marketplace).
Learn more at netclaw.dev.
Netclaw uses a daemon + thin client architecture:
netclawd— an always-on background daemon that hosts LLM sessions, tool execution, and persistence. Start it once and it stays running.netclaw— a lightweight CLI for interactive chat, daemon management, and configuration. It connects to the running daemon over a local socket.
You start the daemon, then use the CLI to talk to it. Remote devices can pair with the daemon over Tailscale or Cloudflare Tunnel for access from anywhere.
- An LLM provider — Ollama (local, default), OpenRouter, or any OpenAI-compatible endpoint. See the full provider documentation for all supported options.
Linux (installs CLI + daemon to ~/.netclaw/bin):
curl -sSL https://releases.netclaw.dev/install.sh | bash# Install only the CLI or only the daemon
curl -sSL https://releases.netclaw.dev/install.sh | bash -s -- cli
curl -sSL https://releases.netclaw.dev/install.sh | bash -s -- daemon
# Pin a specific version
NETCLAW_VERSION=0.17.1 curl -sSL https://releases.netclaw.dev/install.sh | bashWindows (installs to %LOCALAPPDATA%\Programs\netclaw):
iwr -useb https://releases.netclaw.dev/install.ps1 | iexDocker (multi-arch: amd64/arm64):
docker run -d --name netclawd \
-p 5199:5199 \
-v ~/.netclaw:/home/netclaw/.netclaw \
-e NETCLAW_Daemon__Host=0.0.0.0 \
-e NETCLAW_Daemon__ExposureMode=reverse-proxy \
-e NETCLAW_Daemon__TrustedProxies__0=172.16.0.0/12 \
ghcr.io/netclaw-dev/netclaw:latestSee the Docker deployment guide for volume setup, environment variables, and Docker Compose examples.
For the full installation reference (including building from source), see the installation docs.
Run the guided setup wizard:
netclaw initOr create the config manually. The daemon reads layered config from
~/.netclaw/config/:
~/.netclaw/config/netclaw.json — base settings (minimal Ollama example):
{
"configVersion": 1,
"Providers": {
"local-ollama": {
"Type": "ollama",
"Endpoint": "http://localhost:11434"
}
},
"Models": {
"Main": { "Provider": "local-ollama", "ModelId": "qwen3:30b" }
}
}Credentials are stored encrypted in ~/.netclaw/config/secrets.json. Use the
CLI to manage them — never edit that file by hand:
netclaw secrets set Providers.openrouter.ApiKey sk-or-v1-...
netclaw secrets set Slack.BotToken xoxb-...All settings can also be overridden via environment variables using the
NETCLAW_ prefix with double-underscore separators for nested keys:
export NETCLAW_Providers__local-ollama__Endpoint=http://localhost:11434
export NETCLAW_Models__Main__ModelId=qwen3:8bFor the full configuration reference, see the configuration docs.
netclaw doctor # Check config schema, provider connectivity, secrets
netclaw doctor --fix # Auto-apply safe fixes# Start the daemon (background process)
netclaw daemon start
# Check daemon status
netclaw daemon status
# Interactive chat (connects to running daemon)
netclaw chat
# Single-prompt mode (non-interactive)
netclaw chat -p "What's on my calendar today?"
# Stop the daemon
netclaw daemon stopFor the full quickstart walkthrough, see the quickstart guide.
Netclaw connects to your team's existing communication channels:
- Docker — multi-arch images on GHCR (
ghcr.io/netclaw-dev/netclaw) - systemd —
netclaw daemon installcreates a user-level service - Exposure Modes — local, Tailscale, or Cloudflare Tunnel
Netclaw is default-deny from the ground up. The daemon requires explicit configuration before it will execute tools, connect to channels, or accept remote connections.
- Security Model — audiences, approval gates, tool policies
- Hardening Guide — production lockdown checklist
- Secrets Management — encrypted-at-rest credential storage
- Pairing Remote Devices — two-sided pairing protocol with rate-limited code exchange
Full CLI documentation is available at netclaw.dev/cli.
netclaw init First-run setup wizard
netclaw chat Interactive TUI chat
netclaw chat -p <text> Headless single-prompt mode
netclaw doctor Configuration diagnostics
netclaw daemon start|stop|status Manage the daemon process
netclaw daemon install Install systemd user service (Linux)
netclaw daemon pair Generate a pairing code for remote access
netclaw provider Manage LLM providers
netclaw model Manage model assignments
netclaw mcp Manage MCP server profiles
netclaw skill Manage skills and skill sources
netclaw reminder Manage scheduled reminders
netclaw webhooks Manage inbound webhook routes
netclaw secrets set <k> <v> Manage encrypted secrets
netclaw update Check for and install updates
netclaw version Show CLI version
Visit netclaw.dev/docs for the full documentation, including:
- Getting Started — installation, quickstart, first conversation
- Configuration — providers, models, MCP servers, webhooks, reminders
- Skills — skill system, skill feeds, authoring custom skills
- Guides — Slack setup, MCP permissions, remote pairing
- Architecture — system design and security model
- Observability — health checks, alerts, OpenTelemetry
See CONTRIBUTING.md for development workflows, build
instructions, project structure, and contributor tooling.
Netclaw is licensed under the Apache License, Version 2.0.
See LICENSE for the full text.
Built with care by Petabridge. Visit netclaw.dev for documentation, guides, and community resources.
