Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls. --- name: openclaw-node-setup description: "Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls." metadata: { "openclaw": { "emoji": "🖥️", "requires": { "bins": ["ssh"] }, }, } --- OpenClaw Node Setup Set up remote OpenClaw nodes that connect to your Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 2/25/2026.
Freshness
Last checked 2/25/2026
Best For
openclaw-node-setup is best for recover workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls. --- name: openclaw-node-setup description: "Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls." metadata: { "openclaw": { "emoji": "🖥️", "requires": { "bins": ["ssh"] }, }, } --- OpenClaw Node Setup Set up remote OpenClaw nodes that connect to your
Public facts
5
Change events
1
Artifacts
0
Freshness
Feb 25, 2026
Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 2/25/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Feb 25, 2026
Vendor
Yujesyoga
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 2/25/2026.
Setup snapshot
git clone https://github.com/yujesyoga/openclaw-node-setup.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Yujesyoga
Protocol compatibility
OpenClaw
Adoption signal
1 GitHub stars
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
bash
brew install node npm install -g openclaw
bash
curl -fsSL https://deb.nodesource.com/setup_22.x | sudo -E bash -
bash
curl -fsSL https://deb.nodesource.com/setup_22.x | sudo -E bash - sudo apt-get install -y nodejs npm install -g openclaw
bash
openclaw node run \ --host <gateway-tailscale-ip> \ --port 18789 \ --tls \ --display-name "MyNode"
bash
# On the Gateway machine: openclaw devices list # See pending requests openclaw devices approve <id> # Approve the node
bash
openclaw node install \ --host <gateway-ip> \ --port 18789 \ --tls \ --display-name "MyNode" # Start it launchctl bootstrap gui/$UID ~/Library/LaunchAgents/ai.openclaw.node.plist
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls. --- name: openclaw-node-setup description: "Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls." metadata: { "openclaw": { "emoji": "🖥️", "requires": { "bins": ["ssh"] }, }, } --- OpenClaw Node Setup Set up remote OpenClaw nodes that connect to your
Set up remote OpenClaw nodes that connect to your Gateway for remote command execution, browser automation, and emergency recovery.
What this skill covers:
| Requirement | Details |
|-------------|---------|
| Node.js | ≥ 22 |
| OpenClaw | Latest (npm install -g openclaw) |
| Network | Tailscale or VPN recommended (don't expose Gateway port publicly) |
macOS:
brew install node
npm install -g openclaw
Linux (Ubuntu/Debian):
curl -fsSL https://deb.nodesource.com/setup_22.x | sudo -E bash -
sudo apt-get install -y nodejs
npm install -g openclaw
openclaw node run \
--host <gateway-tailscale-ip> \
--port 18789 \
--tls \
--display-name "MyNode"
# On the Gateway machine:
openclaw devices list # See pending requests
openclaw devices approve <id> # Approve the node
⚠️ Gotcha: Use
openclaw devices approve, NOTopenclaw nodes approve. They are different commands.
macOS (LaunchAgent):
openclaw node install \
--host <gateway-ip> \
--port 18789 \
--tls \
--display-name "MyNode"
# Start it
launchctl bootstrap gui/$UID ~/Library/LaunchAgents/ai.openclaw.node.plist
Linux (systemd):
openclaw node install \
--host <gateway-ip> \
--port 18789 \
--tls \
--display-name "MyNode"
systemctl --user enable --now openclaw-node.service
Manage:
openclaw node status
openclaw node stop
openclaw node restart
If you want the agent to run privileged commands on the node:
echo "$USER ALL=(ALL) NOPASSWD: ALL" | sudo tee /etc/sudoers.d/$USER
Keep the Mac awake 24/7, even with the lid closed:
sudo pmset -a \
sleep 0 \
disksleep 0 \
displaysleep 5 \
womp 1 \
networkoversleep 1 \
powernap 1 \
tcpkeepalive 1 \
standby 0 \
autopoweroff 0 \
hibernatemode 0
| Setting | Value | What it does |
|---------|-------|-------------|
| sleep 0 | Never sleep | Stays awake even with lid closed |
| displaysleep 5 | 5 min | Screen off to save energy |
| womp 1 | On | Wake on network access |
| standby 0 | Off | No deep standby |
| autopoweroff 0 | Off | No auto power off |
| hibernatemode 0 | Off | No hibernation |
| powernap 1 | On | Background tasks while "sleeping" |
| tcpkeepalive 1 | On | Keep TCP connections alive |
Clamshell note: To use the built-in camera with lid closed, you need a fake HDMI dongle (~$5). Without it, macOS disables the camera when the lid closes.
Nodes automatically advertise a browser proxy. This lets the agent browse the web from the node's IP (useful for residential IP access).
# On the node, install Playwright's Chromium:
npx playwright install chromium
browser open target=node node=MyNode profile=openclaw url=https://example.com
browser snapshot target=node node=MyNode profile=openclaw
Add to node config:
{
"nodeHost": {
"browserProxy": {
"enabled": false
}
}
}
Set up SSH access from the node to the Gateway so you can recover from crashes.
ssh-keygen -t ed25519 -f ~/.ssh/id_ed25519 -N '' -C 'node-emergency'
# On the Gateway server:
echo "<paste-public-key>" >> ~/.ssh/authorized_keys
Save as ~/emergency-vps.sh on the node:
#!/bin/bash
# Emergency recovery script — run from node to manage Gateway
VPS="user@<gateway-tailscale-ip>"
NVM="export NVM_DIR=/home/user/.nvm && source \$NVM_DIR/nvm.sh"
case "$1" in
status)
echo "=== Server Status ==="
ssh $VPS "uptime && df -h / && free -h | head -2"
;;
gateway-status)
echo "=== Gateway Status ==="
ssh $VPS "$NVM && openclaw gateway status 2>&1 | grep -E 'Runtime|Listening|Gateway'"
;;
gateway-restart)
echo "=== Restarting Gateway ==="
ssh $VPS "systemctl --user restart openclaw-gateway.service && sleep 2 && systemctl --user is-active openclaw-gateway.service"
;;
gateway-start)
ssh $VPS "systemctl --user start openclaw-gateway.service"
;;
gateway-stop)
ssh $VPS "systemctl --user stop openclaw-gateway.service"
;;
reboot)
echo "=== REBOOTING SERVER ==="
ssh $VPS "sudo reboot"
;;
logs)
echo "=== Recent Gateway Logs ==="
ssh $VPS "tail -50 /tmp/openclaw-1000/openclaw-\$(date +%Y-%m-%d).log"
;;
*)
echo "Usage: $0 {status|gateway-status|gateway-restart|gateway-start|gateway-stop|reboot|logs}"
;;
esac
chmod +x ~/emergency-vps.sh
~/emergency-vps.sh status # Test it
Tailscale SSH note: First connection may require browser approval at
https://login.tailscale.com/.... Do this once while you have physical access.
These are real issues we hit during setup. Each one cost 15-60 minutes to debug:
Symptom: Node connects but immediately disconnects.
Cause: nginx with basic auth or HTTP/2 breaks WebSocket upgrade.
Fix: Connect directly to the Gateway port via Tailscale, bypassing nginx entirely.
Symptom: Connection fails with h2 protocol errors.
Cause: nginx 1.18+ with global http2 directive conflicts with WebSocket upgrade.
Fix: Don't route node connections through nginx. Use direct Tailscale IP + port.
node.json doesn't read token fieldSymptom: Node authenticates but Gateway rejects with "invalid token".
Cause: The token field in ~/.openclaw/node.json may not be read properly.
Fix: Use environment variable instead:
export OPENCLAW_GATEWAY_TOKEN="your-token"
openclaw node run ...
openclaw nodes approve doesn't work for pairingSymptom: You run openclaw nodes approve but nothing happens.
Cause: Wrong command. nodes manages already-paired nodes; devices handles pairing.
Fix:
openclaw devices list # See pending requests
openclaw devices approve <requestId>
Symptom: Node can't connect — "connection refused".
Cause: Gateway defaults to 127.0.0.1 (localhost only).
Fix: Change Gateway bind to lan in config:
{
"gateway": {
"bind": "lan"
}
}
Then restart the Gateway.
Symptom: sudo: a terminal is required to read the password
Fix: Add passwordless sudo (see above).
Symptom: SSH hangs, then prints "visit https://login.tailscale.com/..."
Fix: Open the URL on any device where Tailscale is logged in. One-time approval per connection pair.
~/.openclaw/exec-approvals.json)sudo limited to necessary commands (or full NOPASSWD if trusted)# From the Gateway, check node status:
openclaw nodes status
# Expected output:
# MyNode | darwin | connected | caps: browser, system
From the agent:
nodes status # List all nodes
nodes run node=MyNode command=["uptime"] # Test execution
MIT
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/snapshot"
curl -s "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/contract"
curl -s "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-16T23:29:25.768Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "recover",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:recover|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Yujesyoga",
"href": "https://github.com/yujesyoga/openclaw-node-setup",
"sourceUrl": "https://github.com/yujesyoga/openclaw-node-setup",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T01:47:14.275Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-25T01:47:14.275Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "1 GitHub stars",
"href": "https://github.com/yujesyoga/openclaw-node-setup",
"sourceUrl": "https://github.com/yujesyoga/openclaw-node-setup",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T01:47:14.275Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to openclaw-node-setup and adjacent AI workflows.