Crawler Summary

openclaw-node-setup answer-first brief

Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls. --- name: openclaw-node-setup description: "Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls." metadata: { "openclaw": { "emoji": "🖥️", "requires": { "bins": ["ssh"] }, }, } --- OpenClaw Node Setup Set up remote OpenClaw nodes that connect to your Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 2/25/2026.

Freshness

Last checked 2/25/2026

Best For

openclaw-node-setup is best for recover workflows where OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack

Claim this agent
Agent DossierGitHubSafety: 89/100

openclaw-node-setup

Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls. --- name: openclaw-node-setup description: "Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls." metadata: { "openclaw": { "emoji": "🖥️", "requires": { "bins": ["ssh"] }, }, } --- OpenClaw Node Setup Set up remote OpenClaw nodes that connect to your

OpenClawself-declared

Public facts

5

Change events

1

Artifacts

0

Freshness

Feb 25, 2026

Verifiededitorial-contentNo verified compatibility signals1 GitHub stars

Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 2/25/2026.

1 GitHub starsTrust evidence available

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Feb 25, 2026

Vendor

Yujesyoga

Artifacts

0

Benchmarks

0

Last release

Unpublished

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 2/25/2026.

Setup snapshot

git clone https://github.com/yujesyoga/openclaw-node-setup.git
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Yujesyoga

profilemedium
Observed Feb 25, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

OpenClaw

contractmedium
Observed Feb 25, 2026Source linkProvenance
Adoption (1)

Adoption signal

1 GitHub stars

profilemedium
Observed Feb 25, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB OPENCLEW

Extracted files

0

Examples

6

Snippets

0

Languages

typescript

Parameters

Executable Examples

bash

brew install node
npm install -g openclaw

bash

curl -fsSL https://deb.nodesource.com/setup_22.x | sudo -E bash -

bash

curl -fsSL https://deb.nodesource.com/setup_22.x | sudo -E bash -
sudo apt-get install -y nodejs
npm install -g openclaw

bash

openclaw node run \
  --host <gateway-tailscale-ip> \
  --port 18789 \
  --tls \
  --display-name "MyNode"

bash

# On the Gateway machine:
openclaw devices list          # See pending requests
openclaw devices approve <id>  # Approve the node

bash

openclaw node install \
  --host <gateway-ip> \
  --port 18789 \
  --tls \
  --display-name "MyNode"

# Start it
launchctl bootstrap gui/$UID ~/Library/LaunchAgents/ai.openclaw.node.plist

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB OPENCLEW

Docs source

GITHUB OPENCLEW

Editorial quality

ready

Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls. --- name: openclaw-node-setup description: "Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls." metadata: { "openclaw": { "emoji": "🖥️", "requires": { "bins": ["ssh"] }, }, } --- OpenClaw Node Setup Set up remote OpenClaw nodes that connect to your

Full README

name: openclaw-node-setup description: "Set up and manage OpenClaw remote nodes — headless hosts that connect to your Gateway for remote execution, browser proxy, and emergency recovery. Covers macOS and Linux, with battle-tested solutions for common pitfalls." metadata: { "openclaw": { "emoji": "🖥️", "requires": { "bins": ["ssh"] }, }, }

OpenClaw Node Setup

Set up remote OpenClaw nodes that connect to your Gateway for remote command execution, browser automation, and emergency recovery.

What this skill covers:

  • Installing and pairing a headless node (macOS & Linux)
  • Running as a persistent service (LaunchAgent / systemd)
  • Browser proxy for residential IP browsing
  • Emergency recovery scripts (restart Gateway remotely)
  • Preventing macOS sleep (server mode)
  • Common pitfalls and their solutions

Why use a remote node?

  • Run commands on other machines (MacBook at home, office server, lab machine)
  • Browser proxy — browse with a residential IP instead of datacenter IP
  • Emergency recovery — restart your Gateway when it goes down
  • Distributed execution — delegate tasks to different machines

Prerequisites

| Requirement | Details | |-------------|---------| | Node.js | ≥ 22 | | OpenClaw | Latest (npm install -g openclaw) | | Network | Tailscale or VPN recommended (don't expose Gateway port publicly) |

Quick Start

1. Install OpenClaw on the node

macOS:

brew install node
npm install -g openclaw

Linux (Ubuntu/Debian):

curl -fsSL https://deb.nodesource.com/setup_22.x | sudo -E bash -
sudo apt-get install -y nodejs
npm install -g openclaw

2. First connection (foreground)

openclaw node run \
  --host <gateway-tailscale-ip> \
  --port 18789 \
  --tls \
  --display-name "MyNode"

3. Approve pairing on the Gateway

# On the Gateway machine:
openclaw devices list          # See pending requests
openclaw devices approve <id>  # Approve the node

⚠️ Gotcha: Use openclaw devices approve, NOT openclaw nodes approve. They are different commands.

4. Install as persistent service

macOS (LaunchAgent):

openclaw node install \
  --host <gateway-ip> \
  --port 18789 \
  --tls \
  --display-name "MyNode"

# Start it
launchctl bootstrap gui/$UID ~/Library/LaunchAgents/ai.openclaw.node.plist

Linux (systemd):

openclaw node install \
  --host <gateway-ip> \
  --port 18789 \
  --tls \
  --display-name "MyNode"

systemctl --user enable --now openclaw-node.service

Manage:

openclaw node status
openclaw node stop
openclaw node restart

Passwordless sudo (for full remote control)

If you want the agent to run privileged commands on the node:

echo "$USER ALL=(ALL) NOPASSWD: ALL" | sudo tee /etc/sudoers.d/$USER

Prevent macOS sleep (server mode)

Keep the Mac awake 24/7, even with the lid closed:

sudo pmset -a \
  sleep 0 \
  disksleep 0 \
  displaysleep 5 \
  womp 1 \
  networkoversleep 1 \
  powernap 1 \
  tcpkeepalive 1 \
  standby 0 \
  autopoweroff 0 \
  hibernatemode 0

| Setting | Value | What it does | |---------|-------|-------------| | sleep 0 | Never sleep | Stays awake even with lid closed | | displaysleep 5 | 5 min | Screen off to save energy | | womp 1 | On | Wake on network access | | standby 0 | Off | No deep standby | | autopoweroff 0 | Off | No auto power off | | hibernatemode 0 | Off | No hibernation | | powernap 1 | On | Background tasks while "sleeping" | | tcpkeepalive 1 | On | Keep TCP connections alive |

Clamshell note: To use the built-in camera with lid closed, you need a fake HDMI dongle (~$5). Without it, macOS disables the camera when the lid closes.


Browser Proxy

Nodes automatically advertise a browser proxy. This lets the agent browse the web from the node's IP (useful for residential IP access).

Setup

# On the node, install Playwright's Chromium:
npx playwright install chromium

Usage (from the agent)

browser open target=node node=MyNode profile=openclaw url=https://example.com
browser snapshot target=node node=MyNode profile=openclaw

Disable (if not needed)

Add to node config:

{
  "nodeHost": {
    "browserProxy": {
      "enabled": false
    }
  }
}

Emergency Recovery (SSH back to Gateway)

Set up SSH access from the node to the Gateway so you can recover from crashes.

1. Generate SSH key on the node

ssh-keygen -t ed25519 -f ~/.ssh/id_ed25519 -N '' -C 'node-emergency'

2. Add public key to Gateway

# On the Gateway server:
echo "<paste-public-key>" >> ~/.ssh/authorized_keys

3. Create emergency script

Save as ~/emergency-vps.sh on the node:

#!/bin/bash
# Emergency recovery script — run from node to manage Gateway
VPS="user@<gateway-tailscale-ip>"
NVM="export NVM_DIR=/home/user/.nvm && source \$NVM_DIR/nvm.sh"

case "$1" in
  status)
    echo "=== Server Status ==="
    ssh $VPS "uptime && df -h / && free -h | head -2"
    ;;
  gateway-status)
    echo "=== Gateway Status ==="
    ssh $VPS "$NVM && openclaw gateway status 2>&1 | grep -E 'Runtime|Listening|Gateway'"
    ;;
  gateway-restart)
    echo "=== Restarting Gateway ==="
    ssh $VPS "systemctl --user restart openclaw-gateway.service && sleep 2 && systemctl --user is-active openclaw-gateway.service"
    ;;
  gateway-start)
    ssh $VPS "systemctl --user start openclaw-gateway.service"
    ;;
  gateway-stop)
    ssh $VPS "systemctl --user stop openclaw-gateway.service"
    ;;
  reboot)
    echo "=== REBOOTING SERVER ==="
    ssh $VPS "sudo reboot"
    ;;
  logs)
    echo "=== Recent Gateway Logs ==="
    ssh $VPS "tail -50 /tmp/openclaw-1000/openclaw-\$(date +%Y-%m-%d).log"
    ;;
  *)
    echo "Usage: $0 {status|gateway-status|gateway-restart|gateway-start|gateway-stop|reboot|logs}"
    ;;
esac
chmod +x ~/emergency-vps.sh
~/emergency-vps.sh status  # Test it

Tailscale SSH note: First connection may require browser approval at https://login.tailscale.com/.... Do this once while you have physical access.


Common Pitfalls (Battle-Tested)

These are real issues we hit during setup. Each one cost 15-60 minutes to debug:

🔴 nginx reverse proxy blocks WebSocket

Symptom: Node connects but immediately disconnects.

Cause: nginx with basic auth or HTTP/2 breaks WebSocket upgrade.

Fix: Connect directly to the Gateway port via Tailscale, bypassing nginx entirely.

🔴 HTTP/2 ALPN breaks WebSocket

Symptom: Connection fails with h2 protocol errors.

Cause: nginx 1.18+ with global http2 directive conflicts with WebSocket upgrade.

Fix: Don't route node connections through nginx. Use direct Tailscale IP + port.

🔴 node.json doesn't read token field

Symptom: Node authenticates but Gateway rejects with "invalid token".

Cause: The token field in ~/.openclaw/node.json may not be read properly.

Fix: Use environment variable instead:

export OPENCLAW_GATEWAY_TOKEN="your-token"
openclaw node run ...

🔴 openclaw nodes approve doesn't work for pairing

Symptom: You run openclaw nodes approve but nothing happens.

Cause: Wrong command. nodes manages already-paired nodes; devices handles pairing.

Fix:

openclaw devices list       # See pending requests
openclaw devices approve <requestId>

🔴 Gateway bound to loopback

Symptom: Node can't connect — "connection refused".

Cause: Gateway defaults to 127.0.0.1 (localhost only).

Fix: Change Gateway bind to lan in config:

{
  "gateway": {
    "bind": "lan"
  }
}

Then restart the Gateway.

🔴 sudo requires password over node

Symptom: sudo: a terminal is required to read the password

Fix: Add passwordless sudo (see above).

🔴 Tailscale SSH needs browser approval

Symptom: SSH hangs, then prints "visit https://login.tailscale.com/..."

Fix: Open the URL on any device where Tailscale is logged in. One-time approval per connection pair.


Security Checklist

  • [ ] Gateway port closed in public firewall (only via Tailscale/VPN)
  • [ ] SSH only via Tailscale (port 22 closed publicly)
  • [ ] Exec approvals configured on node (~/.openclaw/exec-approvals.json)
  • [ ] Emergency recovery script tested
  • [ ] sudo limited to necessary commands (or full NOPASSWD if trusted)

Verify Setup

# From the Gateway, check node status:
openclaw nodes status

# Expected output:
# MyNode | darwin | connected | caps: browser, system

From the agent:

nodes status                              # List all nodes
nodes run node=MyNode command=["uptime"]  # Test execution

License

MIT

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

MissingGITHUB OPENCLEW

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

OpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/snapshot"
curl -s "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/contract"
curl -s "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITHUB_REPOSactivepieces

Rank

70

AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents

Traction

No public download signal

Freshness

Updated 2d ago

OPENCLAW
GITHUB_REPOScherry-studio

Rank

70

AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs

Traction

No public download signal

Freshness

Updated 5d ago

MCPOPENCLAW
GITHUB_REPOSAionUi

Rank

70

Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSCopilotKit

Rank

70

The Frontend for Agents & Generative UI. React + Angular

Traction

No public download signal

Freshness

Updated 23d ago

OPENCLAW
Machine Appendix

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_OPENCLEW",
      "generatedAt": "2026-04-16T23:29:25.768Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "recover",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:recover|supported|profile"
}

Facts JSON

[
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Yujesyoga",
    "href": "https://github.com/yujesyoga/openclaw-node-setup",
    "sourceUrl": "https://github.com/yujesyoga/openclaw-node-setup",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-02-25T01:47:14.275Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-02-25T01:47:14.275Z",
    "isPublic": true
  },
  {
    "factKey": "traction",
    "category": "adoption",
    "label": "Adoption signal",
    "value": "1 GitHub stars",
    "href": "https://github.com/yujesyoga/openclaw-node-setup",
    "sourceUrl": "https://github.com/yujesyoga/openclaw-node-setup",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-02-25T01:47:14.275Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/yujesyoga-openclaw-node-setup/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub · GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to openclaw-node-setup and adjacent AI workflows.