Zeroclaw
Fast, small, and fully autonomous AI personal assistant infrastructure, ANY OS, ANY PLATFORM — deploy anywhere, swap anything 🦀
Install / Use
/learn @zeroclaw-labs/ZeroclawREADME
ZeroClaw is a personal AI assistant you run on your own devices. It answers you on the channels you already use (WhatsApp, Telegram, Slack, Discord, Signal, iMessage, Matrix, IRC, Email, Bluesky, Nostr, Mattermost, Nextcloud Talk, DingTalk, Lark, QQ, Reddit, LinkedIn, Twitter, MQTT, WeChat Work, and more). It has a web dashboard for real-time control and can connect to hardware peripherals (ESP32, STM32, Arduino, Raspberry Pi). The Gateway is just the control plane — the product is the assistant.
If you want a personal, single-user assistant that feels local, fast, and always-on, this is it.
<p align="center"> <a href="https://zeroclawlabs.ai">Website</a> · <a href="docs/README.md">Docs</a> · <a href="docs/architecture.md">Architecture</a> · <a href="#quick-start">Getting Started</a> · <a href="#migrating-from-openclaw">Migrating from OpenClaw</a> · <a href="docs/ops/troubleshooting.md">Troubleshoot</a> · <a href="https://discord.com/invite/wDshRVqRjx">Discord</a> </p>Preferred setup: run
zeroclaw onboardin your terminal. ZeroClaw Onboard guides you step by step through setting up the gateway, workspace, channels, and provider. It is the recommended setup path and works on macOS, Linux, and Windows (via WSL2). New install? Start here: Getting started
Subscription Auth (OAuth)
- OpenAI Codex (ChatGPT subscription)
- Gemini (Google OAuth)
- Anthropic (API key or auth token)
Model note: while many providers/models are supported, for the best experience use the strongest latest-generation model available to you. See Onboarding.
Models config + CLI: Providers reference Auth profile rotation (OAuth vs API keys) + failover: Model failover
Install (recommended)
Runtime: Rust stable toolchain. Single binary, no runtime dependencies.
Homebrew (macOS/Linuxbrew)
brew install zeroclaw
One-click bootstrap
git clone https://github.com/zeroclaw-labs/zeroclaw.git
cd zeroclaw
./install.sh
zeroclaw onboard runs automatically after install to configure your workspace and provider.
Quick start (TL;DR)
Full beginner guide (auth, pairing, channels): Getting started
# Install + onboard
./install.sh --api-key "sk-..." --provider openrouter
# Start the gateway (webhook server + web dashboard)
zeroclaw gateway # default: 127.0.0.1:42617
zeroclaw gateway --port 0 # random port (security hardened)
# Talk to the assistant
zeroclaw agent -m "Hello, ZeroClaw!"
# Interactive mode
zeroclaw agent
# Start full autonomous runtime (gateway + channels + cron + hands)
zeroclaw daemon
# Check status
zeroclaw status
# Run diagnostics
zeroclaw doctor
Upgrading? Run zeroclaw doctor after updating.
From source (development)
git clone https://github.com/zeroclaw-labs/zeroclaw.git
cd zeroclaw
cargo build --release --locked
cargo install --path . --force --locked
zeroclaw onboard
Dev fallback (no global install): prefix commands with
cargo run --release --(example:cargo run --release -- status).
Migrating from OpenClaw
ZeroClaw can import your OpenClaw workspace, memory, and configuration:
# Preview what will be migrated (safe, read-only)
zeroclaw migrate openclaw --dry-run
# Run the migration
zeroclaw migrate openclaw
This migrates your memory entries, workspace files, and configuration from ~/.openclaw/ to ~/.zeroclaw/. Config is converted from JSON to TOML automatically.
Security defaults (DM access)
ZeroClaw connects to real messaging surfaces. Treat inbound DMs as untrusted input.
Full security guide: SECURITY.md
Default behavior on all channels:
- DM pairing (default): unknown senders receive a short pairing code and the bot does not process their message.
- Approve with:
zeroclaw pairing approve <channel> <code>(then the sender is added to a local allowlist). - Public inbound DMs require an explicit opt-in in
config.toml. - Run
zeroclaw doctorto surface risky or misconfigured DM policies.
Autonomy levels:
| Level | Behavior |
|-------|----------|
| ReadOnly | Agent can observe but not act |
| Supervised (default) | Agent acts with approval for medium/high risk operations |
| Full | Agent acts autonomously within policy bounds |
Sandboxing layers: workspace isolation, path traversal blocking, command allowlisting, forbidden paths (/etc, /root, ~/.ssh), rate limiting (max actions/hour, cost/day caps).
📢 Announcements
Use this board for important notices (breaking changes, security advisories, maintenance windows, and release blockers).
| Date (UTC) | Level | Notice | Action | | ---------- | ----------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
