Ecosystem#
NemoClaw provides onboarding, lifecycle management, and management of OpenClaw within OpenShell containers.
This page describes how the ecosystem is formed across projects, where NemoClaw sits relative to OpenShell and OpenClaw, and how to choose between NemoClaw and OpenShell.
How the Stack Fits Together#
Three pieces usually appear together in a NemoClaw deployment, each with a distinct scope:
Project |
Scope |
|---|---|
The assistant: runtime, tools, memory, and behavior inside the container. It does not define the sandbox or the host gateway. |
|
The execution environment: sandbox lifecycle, network, filesystem, and process policy, inference routing, and the operator-facing |
|
NemoClaw |
The NVIDIA reference stack that implements the definition above on the host: |
NemoClaw sits above OpenShell in the operator workflow. It drives OpenShell APIs and CLI to create and configure the sandbox that runs OpenClaw. Models and endpoints sit behind OpenShell’s inference routing. NemoClaw onboarding wires provider choice into that routing.
flowchart TB
NC["🦞 NVIDIA NemoClaw<br/>CLI, plugin, blueprint"]
OS["🐚 NVIDIA OpenShell<br/>Gateway, policy, inference routing"]
OC["🦞 OpenClaw<br/>Assistant in sandbox"]
NC -->|orchestrates| OS
OS -->|isolates and runs| OC
classDef nv fill:#76b900,stroke:#333,color:#fff
classDef nvLight fill:#e6f2cc,stroke:#76b900,color:#1a1a1a
classDef nvDark fill:#333,stroke:#76b900,color:#fff
class NC nv
class OS nv
class OC nvDark
linkStyle 0 stroke:#76b900,stroke-width:2px
linkStyle 1 stroke:#76b900,stroke-width:2px
NemoClaw Path versus OpenShell Path#
Both paths assume OpenShell can sandbox a workload. The difference is who owns the integration work.
Path |
What it means |
|---|---|
NemoClaw path |
You adopt the reference stack. NemoClaw’s blueprint encodes a hardened image, default policies, and orchestration so |
OpenShell path |
You use OpenShell as the platform and supply your own container, install steps for OpenClaw, policy YAML, provider setup, and any host bridges. OpenShell stays the sandbox and policy engine; nothing requires NemoClaw’s blueprint or CLI. |
What NemoClaw Adds Beyond the OpenShell Community Sandbox#
OpenShell ships a community sandbox for OpenClaw.
Running openshell sandbox create --from openclaw pulls that package, builds the image, applies the bundled policy, and starts a working sandbox.
This is a valid path, and it produces a running OpenClaw environment with OpenShell isolation.
NemoClaw builds on that foundation with additional security hardening, automation, and lifecycle tooling. The following table compares the two paths.
Capability |
|
|
|---|---|---|
Sandbox isolation |
Yes. OpenShell applies seccomp filters, Landlock filesystem restrictions, privilege dropping, network namespace isolation, and no-new-privileges enforcement. The community sandbox bundles its own policy tailored for OpenClaw. |
Yes. NemoClaw applies these through the blueprint and layers a more restrictive policy on top (see rows below). |
Credential handling |
OpenShell’s provider system replaces real credentials with placeholder tokens in the sandbox environment. The L7 proxy resolves placeholders to real values at egress. You create providers manually with |
NemoClaw creates OpenShell providers automatically during onboarding. It also filters sensitive host environment variables (provider API keys, |
Image hardening |
The community image includes standard system tools for general-purpose use. |
NemoClaw strips build toolchains ( |
Filesystem policy |
The community sandbox bundles a policy for OpenClaw. |
NemoClaw defines a more restrictive read-only and read-write layout. The agent’s home directory ( |
Inference setup |
The community sandbox includes an |
NemoClaw’s onboarding wizard validates your credential from the host, lets you select a provider (NVIDIA Endpoints, OpenAI, Anthropic, Google Gemini, Ollama, and compatible endpoints), and configures OpenShell’s inference routing automatically. Credentials stay on the host and are delivered through OpenShell’s provider system. |
Channel messaging |
OpenShell provides the credential provider system and L7 proxy that delivers channel tokens securely (including path-based resolution for Telegram’s |
NemoClaw automates channel setup during onboarding: it collects bot tokens, registers them as OpenShell providers, and bakes OpenClaw channel config with placeholder tokens that OpenShell’s proxy resolves at egress. No separate bridge process runs on the host. |
Blueprint versioning |
No blueprint. The community sandbox uses whatever image version is currently published. |
NemoClaw downloads the blueprint artifact, checks version compatibility, and verifies its digest before applying. Running |
State migration |
Not included. |
NemoClaw migrates agent state across machines with credential stripping and integrity verification. |
Process count limits |
OpenShell applies seccomp and privilege dropping. You set process count limits manually with |
NemoClaw applies |
When to Use Which#
Use the following table to decide when to use NemoClaw versus OpenShell.
Situation |
Prefer |
|---|---|
You want OpenClaw with minimal assembly, NVIDIA defaults, and the documented install and onboard flow. |
NemoClaw |
You need maximum flexibility for custom images, a layout that does not match the NemoClaw blueprint, or a workload outside this reference stack. |
OpenShell with your own integration |
You are standardizing on the NVIDIA reference for always-on assistants with policy and inference routing. |
NemoClaw |
You are building internal platform abstractions where the NemoClaw CLI or blueprint is not the right fit. |
OpenShell (and your orchestration) |