NemoClaw is alpha software. Interfaces, APIs, and behavior may change without notice. See the release notes for current status.
How the pieces fit together
Thenemoclaw CLI is the primary entrypoint for setting up and managing sandboxed OpenClaw agents. It delegates the heavy lifting to a versioned blueprint — a Python artifact that orchestrates sandbox creation, policy application, and inference provider setup through the OpenShell CLI.
| Component | Role |
|---|---|
| Plugin | TypeScript CLI commands for launch, connect, status, and logs. Registers under nemoclaw and openclaw nemoclaw. |
| Blueprint | Versioned Python artifact that orchestrates sandbox creation, policy application, and inference setup. |
| Sandbox | Isolated OpenShell container running OpenClaw with policy-enforced egress and filesystem. |
| Inference | NVIDIA cloud model calls, routed through the OpenShell gateway, transparent to the agent. |
Design principles
NemoClaw’s architecture is built around five principles: Thin plugin, versioned blueprint The plugin stays small and stable. Orchestration logic lives in the blueprint, which evolves on its own release cadence. Updating the blueprint does not require updating the plugin. Respect CLI boundaries Thenemoclaw host CLI is the primary interface. Plugin commands are also available under openclaw nemoclaw, but they do not override built-in OpenClaw commands.
Supply chain safety
Blueprint artifacts are immutable, versioned, and digest-verified before execution. The blueprint manifest includes a digest field computed at release time. The plugin verifies this digest before running any blueprint code.
OpenShell-native for new installs
For users without an existing OpenClaw installation, NemoClaw recommends openshell sandbox create directly rather than a plugin-driven bootstrap. This avoids installing OpenClaw on the host only to redeploy it inside OpenShell.
Reproducible setup
Running setup again recreates the sandbox from the same blueprint and policy definitions. The sandbox image (ghcr.io/nvidia/openshell-community/sandboxes/openclaw:latest) is pinned per blueprint version.
Plugin and blueprint
NemoClaw is split into two distinct parts:- The plugin is a TypeScript package that powers the
nemoclawhost CLI and also registers commands underopenclaw nemoclaw. It handles user interaction, validates inputs, and delegates orchestration work to the blueprint. - The blueprint is a versioned Python artifact (defined in
blueprint.yaml) that contains all the logic for creating sandboxes, applying policies, and configuring inference providers. The plugin resolves, verifies, and executes the blueprint as a subprocess.
default, ncp, nim-local, and vllm — each corresponding to a different inference backend.
Sandbox creation flow
When you runnemoclaw onboard, NemoClaw creates an OpenShell sandbox that runs OpenClaw in an isolated container. The blueprint orchestrates this process through the OpenShell CLI.
Resolve and verify the blueprint
The plugin downloads the blueprint artifact and checks version compatibility against the installed versions of OpenShell and OpenClaw. It then verifies the artifact’s SHA digest against the value recorded in the manifest. If verification fails, execution stops.
Plan the deployment
The blueprint runs in
plan mode to determine which OpenShell resources need to be created or updated — the gateway, inference providers, sandbox container, and network policy.Apply through the OpenShell CLI
The blueprint calls OpenShell CLI commands to create the sandbox and configure each resource. For the default profile, this includes:
- Creating the OpenClaw sandbox container from
ghcr.io/nvidia/openshell-community/sandboxes/openclaw:latest - Registering the inference provider (
nvidia-inference) pointing tohttps://integrate.api.nvidia.com/v1 - Applying the baseline network and filesystem policy from
sandboxes/openclaw/policy.yaml - Forwarding port
18789for the OpenClaw API
Sandbox starts with policies enforced
After the sandbox starts, the agent runs inside it with all network, filesystem, and inference controls active. Policy is enforced from the first instruction the agent executes.
Inference routing
Inference requests from the agent never leave the sandbox directly. OpenShell intercepts every inference call at the gateway and routes it to the configured provider.| Profile | Provider | Endpoint | Default model | Credential env |
|---|---|---|---|---|
default | nvidia-nim | https://integrate.api.nvidia.com/v1 | nvidia/nemotron-3-super-120b-a12b | NVIDIA_API_KEY |
ncp | nvidia-ncp | Configured at onboard time | nvidia/nemotron-3-super-120b-a12b | NVIDIA_API_KEY |
nim-local | nim-local | http://nim-service.local:8000/v1 | nvidia/nemotron-3-super-120b-a12b | NIM_API_KEY |
vllm | vllm-local | http://localhost:8000/v1 | nvidia/nemotron-3-nano-30b-a3b | OPENAI_API_KEY |
The
nim-local and vllm profiles are experimental. Use default or ncp for production.nemoclaw onboard command prompts for this key during setup.
Network and filesystem policy
The sandbox starts with a strict baseline policy defined insandboxes/openclaw/policy.yaml. This policy controls which network endpoints the agent can reach and which filesystem paths it can access.
| Layer | What it protects | When it applies |
|---|---|---|
| Network | Blocks unauthorized outbound connections. | Hot-reloadable at runtime. |
| Filesystem | Prevents reads/writes outside /sandbox and /tmp. | Locked at sandbox creation. |
| Process | Blocks privilege escalation and dangerous syscalls. | Locked at sandbox creation. |
| Inference | Reroutes model API calls to controlled backends. | Hot-reloadable at runtime. |
Network policy
Only endpoints listed in the policy are allowed. When the agent tries to reach an unlisted host, OpenShell blocks the request and surfaces it in the TUI for operator approval.Filesystem policy
The agent can write to/sandbox and /tmp. All other system paths are read-only. This is enforced using Landlock LSM and cannot be changed at runtime.
Process isolation
The sandbox uses seccomp to block privilege escalation syscalls and a dedicated network namespace to prevent direct host network access. These controls are applied at sandbox creation and cannot be hot-reloaded.Diagnosing issues
Errors may originate from either NemoClaw or the OpenShell layer underneath.Next steps
Quickstart
Follow the step-by-step guide to install NemoClaw and run your first sandboxed agent.
Architecture
Full technical reference: plugin file layout, blueprint lifecycle, and sandbox environment.
Inference profiles
Detailed provider configuration for NVIDIA Build, NCP, NIM, and local backends.
Network policies
Egress control, policy customization, and pre-approving trusted domains.