openclaw-remote
Provides step-by-step procedures to manage OpenClaw remotely via ssh/tmux, configure model providers, and harden installations. The skill contains explicit shell commands (e.g., tmux, chmod, python3 -c), external endpoints (e.g., https://integrate.api.nvidia.com/v1, ssh user@remote), and instructs using/storing secrets via ZAI_API_KEY/ANTHROPIC_API_KEY.
OpenClaw Remote Management Skill
Production-tested procedures for setting up, configuring, and hardening OpenClaw installations on remote machines.
This skill provides battle-tested workflows for managing OpenClaw agents via SSH/tmux, including provider configuration, security hardening, and troubleshooting. All procedures have been validated against real OpenClaw installations.
🔒 Security Policy
This skill uses SAFE operations only:
- ✅ Read-only verification commands (
openclaw health,openclaw models status) - ✅ OpenClaw's built-in CLI commands (
openclaw models auth,openclaw doctor) - ✅ File permission changes (
chmod) on OpenClaw config directories only - ❌ NO SSH key generation or modification
- ❌ NO shell startup file modifications (
~/.bashrc,~/.zshrc) - ❌ NO automated cron job creation
- ❌ NO arbitrary system-level persistence mechanisms
All high-risk operations must be performed manually by the user.
🎯 What This Skill Does
- Remote Setup: Connect to OpenClaw installations via existing SSH access
- Provider Config: Configure AI model providers using OpenClaw's built-in commands
- Security Hardening: Apply AI SAFE² framework with reality-tested procedures (no theoretical configs that fail)
- Troubleshooting: Fix common issues with proven solutions
- Git Rollback: Track OpenClaw config changes for easy rollback
🚀 Quick Start
Prerequisites
- SSH access to a remote machine running OpenClaw
- OR a local tmux session with OpenClaw
- Basic command line knowledge
Installation
-
Clone this skill into your Ishi skills directory:
git clone https://github.com/ClawHQ/openclaw-remote.git ~/.config/ishi/skill/openclaw-remote -
Verify the skill is loaded:
# Ask Ishi to help with OpenClaw # The skill will be automatically loaded when needed
Usage
Simply ask your AI assistant to help with OpenClaw tasks:
"Help me check my OpenClaw installation in tmux"
"Configure zai model provider for my OpenClaw agent"
"Harden my OpenClaw security"
📋 Core Workflows
Phase 1: Establish Remote Connection
Choose your connection method:
- Tailscale (recommended): Zero-config secure remote access
- Direct SSH: Traditional server access
- SSH Tunnel: Additional security layer
# Check if OpenClaw exists remotely
ssh user@remote "which openclaw || echo 'No OpenClaw found'"
# Connect to tmux session
ssh user@remote "tmux attach -s openclaw"
Phase 2: Assess Current State
# Check existing tmux sessions
tmux list-sessions
# Verify OpenClaw health
openclaw health
openclaw models status
Phase 3: Configure Providers & Models
See guides/providers.md for detailed provider configurations.
Supported Providers:
- Built-in:
zai,anthropic,openai,openrouter,ollama - Custom: NVIDIA NIM, LM Studio
# Set primary model
openclaw models set zai/glm-4.7
# Add fallback model
openclaw models fallbacks add zai/glm-4.6
# Configure authentication
openclaw models auth paste-token
Phase 4: Security Hardening
⚠️ IMPORTANT: OpenClaw already has strong security defaults. This phase is about verification, not configuration hacking.
See guides/hardening.md and guides/LESSONS_LEARNED.md for details.
What Actually Works:
# 1. Lock file permissions
chmod 700 ~/.openclaw
chmod 600 ~/.openclaw/openclaw.json
chmod 700 ~/.openclaw/credentials
# 2. Verify network security
netstat -an | grep 18789 | grep LISTEN
# Should show: 127.0.0.1 (NOT 0.0.0.0)
# 3. Run security audit
openclaw security audit --deep
# Target: 0 critical issues
# 4. Validate config
openclaw doctor --fix
What DOESN'T Work (skip these):
- ❌
logging.redactSensitive- Unsupported field - ❌
agents.defaults.tools- Unsupported field - ❌
agents.defaults.sandbox- Unsupported field
These fields cause config validation errors. OpenClaw has built-in security controls.
Phase 5: Git-Track for Rollback
cd ~/.openclaw && git init
printf 'agents/*/sessions/\nagents/*/agent/*.jsonl\n*.log\n' > .gitignore
git add .gitignore openclaw.json
git commit -m "config: baseline hardened config"
To rollback:
cd ~/.openclaw
git log --oneline
git checkout <commit-hash> -- openclaw.json
openclaw doctor --fix
🛡️ Security Built-In
OpenClaw comes with enterprise-grade security by default:
✅ Secure authentication required
✅ Strong workspace isolation
✅ CSRF protections
✅ Secrets encrypted at rest
✅ Private-by-default networking (localhost binding)
✅ Secure OAuth flows (state/PKCE)
✅ WebSocket origin validation
✅ Rate limiting on sensitive endpoints
Your job: Verify these are working, maintain good operational security practices.
🖥️ Manage with Claw Desktop
Want a visual cockpit for managing your OpenClaw agents? Claw Desktop provides:
Mission Control
- Fleet Analytics: Monitor multiple OpenClaw agents in real-time
- Gateway Health: Track latency, status, and instant alerts
- Usage Tracking: Claude credits, code summaries, infrastructure costs
Operator Cockpit
- While-You-Were-Away Sync: Resume runs instantly—no scrolling through Slack history
- Artifact Review: Diffs, outputs, and verification checklists in one place
- One-Click Resume: Continue the same run_id across Slack and Desktop
Two Runtime Options
- Local Ishi Agent: Built-in agent that runs on your desktop (instant, local-first)
- Remote OpenClaw: Connect to your remote gateway for overnight work
Download Claw Desktop →
Free forever for basic use. Available for macOS (Apple Silicon & Intel) and Windows.
📚 Documentation
Guides
- hardening.md - Production-tested security hardening procedures
- LESSONS_LEARNED.md - What works vs. what doesn't (based on real experience)
- providers.md - Configure AI model providers
- remote-connect.md - SSH and Tailscale connection setup
Quick Reference
| Task | Command | Expected Result |
|---|---|---|
| Check network | netstat -an | grep 18789 | 127.0.0.1 (not 0.0.0.0) |
| Validate config | openclaw doctor --fix | "Doctor complete." |
| Security scan | openclaw security audit --deep | 0 critical |
| Check health | openclaw health | "Discord: ok" |
| Auth status | openclaw models status | Lists auth providers |
🔧 Troubleshooting
| Symptom | Fix |
|---|---|
| Command not found on host | Expected - OpenClaw must be on remote machine |
| No tmux session | tmux new -s openclaw |
| ENOENT uv_cwd | cd ~ first (working directory deleted) |
| Config validation failed: logging.redactSensitive | ❌ Unsupported - remove it |
| Config validation failed: agents.defaults.tools | ❌ Unsupported - remove it |
| Config invalid | openclaw doctor --fix |
| Gateway WebSocket closure | Restart gateway or check Claw Desktop |
| Agent reply timeout | Provider slow/down - add fallback model |
Full troubleshooting guide in skill.md.
🎓 Philosophy: Verification Over Configuration
Key Insight: OpenClaw is secure by design. The hardening process is about verification and operational security, not configuration hacking.
Instead of adding manual security configs that may fail validation:
- ✅ Verify network is localhost-bound
- ✅ Lock down file permissions
- ✅ Run built-in security tools
- ✅ Maintain good operational practices
See guides/LESSONS_LEARNED.md for detailed explanations.
📦 Repository Structure
openclaw-remote/
├── README.md # This file
├── skill.md # Main skill instructions
└── guides/
├── hardening.md # Security hardening procedures
├── LESSONS_LEARNED.md # What works vs. what doesn't
├── providers.md # Provider configuration guide
└── remote-connect.md # SSH/Tailscale setup
🤝 Contributing
Found an issue or have improvements? Contributions are welcome!
- Fork the repository
- Create a feature branch (
git checkout -b feature/improvement) - Test your changes against a real OpenClaw installation
- Commit with clear messages (
git commit -m "docs: improve hardening guide") - Push and open a Pull Request
Please ensure:
- All procedures are tested against real OpenClaw installations
- Documentation clearly marks what works vs. what doesn't
- Examples include expected output
📄 License
MIT License - see LICENSE file for details.
🔗 Related Projects
- OpenClaw - The AI agent framework this skill manages
- Claw Desktop - Visual cockpit for managing OpenClaw agents
- Ishi - The AI assistant that uses this skill
💬 Support
- Discord: Join the Claw Discord
- GitHub Issues: Report issues here
- Documentation: Claw Docs
Built with 🦀 by the Claw community
Based on real-world experience hardening production OpenClaw installations