This project is archived and no longer maintained.
Clawup was built on top of OpenClaw, which has undergone frequent breaking changes that made it impractical to keep this framework stable and reliable. Rather than leave users with a broken tool, this repo has been archived.
If you are currently using Clawup, please migrate away. Deployments that are already running may continue to work, but no fixes, updates, or support will be provided.
The documentation below is preserved for reference only.
____ _ ___ ___ _ ____
/ ___| | / \ \ / / | | | _ \
| | | | / _ \ \ /\ / /| | | | |_) |
| |___| |___ / ___ \ V V / | |_| | __/
\____|_____/_/ \_\_/\_/ \___/|_|
The secure golden path for deploying OpenClaw agent swarms — identity-driven, infrastructure-as-code, zero public ports.
Clawup provisions autonomous AI agents with persistent memory, role-specific behavior, and secure-by-default networking. Each agent runs in a Docker sandbox with its own identity — personality, skills, tools, and model preferences — connected over a Tailscale mesh VPN with no public port exposure.
You define what your agents do. Clawup handles where and how they run — securely.
- Zero public ports — all agent ports bind to
127.0.0.1, accessible only via Tailscale - Encrypted secrets — API keys and tokens stored via Pulumi encrypted config
- Mesh VPN — agents communicate over Tailscale's encrypted peer-to-peer network
- Docker isolation — each agent runs in a sandboxed container
- Token-based auth — gateway access requires authentication
┌─────────────────────────────────────────────────────────────────────┐
│ AWS VPC / Hetzner Cloud │
│ │
│ ┌──────────────┐ ┌──────────────┐ ┌──────────────┐ │
│ │ Agent A │ │ Agent B │ │ Agent C │ │
│ │ │ │ │ │ │ │
│ │ • OpenClaw │ │ • OpenClaw │ │ • OpenClaw │ │
│ │ • Docker │ │ • Docker │ │ • Docker │ │
│ │ • Tailscale │ │ • Tailscale │ │ • Tailscale │ │
│ └──────┬───────┘ └──────┬───────┘ └──────┬───────┘ │
│ └──────────────────┼──────────────────┘ │
└────────────────────────────┼────────────────────────────────────────┘
│
┌────────────▼────────────┐
│ Tailscale Mesh VPN │
│ (Encrypted P2P) │
└────────────┬────────────┘
│
┌────────────▼────────────┐
│ Your Machine │
└─────────────────────────┘
Agents are defined by identities — composable, self-contained packages that include everything an agent needs to operate: personality, skills, model preferences, plugin configuration, and dependencies.
An identity is a directory with an identity.yaml manifest and workspace files:
my-identity/
├── identity.yaml # Manifest: model, plugins, deps, skills, template vars
├── SOUL.md # Personality, role, approach, communication style
├── IDENTITY.md # Name, role, emoji
├── HEARTBEAT.md # Periodic tasks and state machine logic
├── TOOLS.md # Tool reference (integrations, local env)
├── AGENTS.md # Multi-agent coordination instructions
├── BOOTSTRAP.md # First-run setup instructions
├── USER.md # Owner-specific info (templated)
└── skills/ # Bundled skills
└── my-skill/
└── SKILL.md
Identities can live in a Git repo, a monorepo subdirectory, or a local path. Point any agent at any identity:
# clawup.yaml
agents:
- name: agent-researcher
displayName: Atlas
role: researcher
identity: "https://github.com/your-org/your-identities#researcher"
identityVersion: "v1.0.0" # optional: pin to a tag or commit
volumeSize: 20The identity manifest declares the agent's defaults:
name: researcher
displayName: Atlas
role: researcher
emoji: telescope
description: Deep research, source analysis, report generation
volumeSize: 20
model: anthropic/claude-opus-4-6
codingAgent: claude-code
deps:
- brave-search
plugins:
- slack
pluginDefaults:
slack:
mode: socket
dm:
enabled: true
policy: open
skills:
- research-report
templateVars:
- OWNER_NAME
- TIMEZONE
- WORKING_HOURS
- USER_NOTES
# Additional secrets not covered by plugins/deps
requiredSecrets:
- notionApiKey # → <ROLE>_NOTION_API_KEY in .envThe easiest way to create a new identity is with army-create:
npx army-createThis interactively scaffolds all required files — identity.yaml, workspace files, and skill stubs. See the examples/identity/ directory for a minimal single-agent example, or examples/multi-agent/ for a production-ready 3-agent fleet. The Creating Identities guide covers the full authoring reference including:
- Identity structure and required files
identity.yamlfield reference- Workspace file conventions
- Skill authoring (private and public)
- Template variable substitution
- Available registries (deps, plugins, coding agents)
Hooks are shell scripts that run at specific points during deployment and provisioning. They're available at three levels — swarm (clawup.yaml), identity (identity.yaml), and plugin (plugin manifest) — letting you scope automation from fleet-wide concerns down to individual plugin setup. Hooks can auto-resolve derived secrets, install server-side tools, run interactive onboarding, and perform pre-launch configuration.
# clawup.yaml — swarm-level hooks (run for all agents)
hooks:
postProvision: |
echo "Installing fleet monitoring..."
curl -sSL https://get.datadoghq.com/agent | sh# identity.yaml — identity-level hooks (run for agents using this identity)
hooks:
postProvision: |
echo "Installing engineering tools..."
npm install -g turbo prettier
preStart: |
echo "Verifying repo access..."
gh auth statusLifecycle hooks execute in order: swarm → identity → plugin. Resolve hooks use most-specific-wins on key conflicts. See the Lifecycle Hooks guide for the full reference.
Agents use OpenClaw plugins for integrations with external services. Built-in plugins (Linear, Slack) have curated manifests in the plugin registry and work out of the box — just list them in identity.yaml. For third-party or custom plugins, bundle a manifest in plugins/<name>.yaml inside the identity directory to define secrets, hooks, and configuration. See the Plugins guide for installation, authoring, and the full manifest reference.
npm install -g clawupclawup initDiscovers local identity directories and scaffolds a clawup.yaml manifest and .env.example with sensible defaults (AWS, us-east-1). Edit clawup.yaml by hand to customize your provider, region, instance type, owner info, and agents.
cp .env.example .env
# Edit .env and fill in your API keysclawup deployValidates all secrets from .env, configures Pulumi, and deploys your agents. If any secrets are missing, it prints exactly what's needed.
Wait 3-5 minutes for cloud-init to complete, then:
clawup validateclawup ssh <agent-name> # SSH by name, role, or aliasRun clawup --help for the full list.
| Command | Description |
|---|---|
clawup init |
Generate clawup.yaml scaffold (or refresh from identity changes) |
clawup deploy |
Validate secrets, configure Pulumi, and deploy agents |
clawup deploy --local |
Deploy to local Docker containers |
clawup status |
Show agent statuses and outputs |
clawup status --local |
Show local Docker container status |
clawup ssh <agent> |
SSH to an agent by name, role, or alias |
clawup ssh <agent> --local |
Shell into a local Docker container |
clawup validate |
Health check all agents via Tailscale |
clawup validate --local |
Health check local Docker containers |
clawup redeploy |
Update agents in-place (pulumi up --refresh) |
clawup redeploy --local |
Redeploy local Docker containers |
clawup destroy |
Tear down all resources (with confirmation) |
clawup destroy --local |
Destroy local Docker containers only |
clawup list |
Show project config |
clawup config show |
Display current config |
clawup config show --json |
Config in JSON format |
clawup config set <key> <value> |
Update a config value |
clawup config set <key> <value> -a <agent> |
Update a per-agent config value |
clawup secrets set <key> <value> |
Set a Pulumi secret (e.g. API keys) |
clawup secrets list |
Show which secrets are configured (redacted) |
clawup push |
Push workspace files, skills, and config to running agents |
clawup onboard |
Run plugin onboard hooks for interactive first-time setup |
clawup webhooks setup |
Configure Linear webhooks for deployed agents |
clawup update |
Update clawup CLI to the latest version |
Agent resolution is flexible — all of these target the same agent:
clawup ssh pm # by role
clawup ssh agent-pm # by resource name
clawup ssh juno # by displayName| Feature | AWS | Hetzner Cloud |
|---|---|---|
| 3x Agents (monthly) | ~$99 | ~$18-22 |
| Instance Type | t3.medium (2 vCPU, 4GB) | CX22 (2 vCPU, 4GB) |
| Storage | ~$2.40/month per 30GB | Included |
| Data Transfer | ~$5-10/month | 20TB included |
| Regions | Global (25+) | EU & US (5 locations) |
| Setup Complexity | Moderate (VPC, IAM) | Simple (API token) |
Use Hetzner for development and cost savings (~80% cheaper). Use AWS for production or global reach.
Each agent gets:
- Cloud instance (EC2 or Hetzner server) with Ubuntu 24.04 LTS
- Docker (for OpenClaw sandbox)
- Node.js v22, OpenClaw CLI, coding agent CLI (from registry), GitHub CLI
- Tailscale VPN (encrypted mesh, no public ports)
- Workspace files and skills injected from its identity
- AI model configured per-identity (with fallback support)
- Plugins and deps installed per-identity
All agents share a single VPC/network for cost optimization.
You need the following installed on your local machine before running clawup init.
| Dependency | Why | Install |
|---|---|---|
| Node.js 18+ | Runtime for CLI and Pulumi program | nodejs.org |
| Pulumi CLI | Infrastructure provisioning | pulumi.com/docs/iac/download-install |
| Pulumi Account | State management and encrypted secrets | app.pulumi.com/signup |
| Tailscale | Secure mesh VPN to reach your agents | tailscale.com/download |
Pick one depending on where you want to deploy:
| Provider | Dependency | Install |
|---|---|---|
| AWS | AWS CLI (configured with credentials) | aws.amazon.com/cli — then run aws configure |
| Hetzner | API token with Read & Write permissions | console.hetzner.cloud → Project → Security → API Tokens |
Tailscale requires a few one-time setup steps:
- Create an account
- Enable HTTPS certificates (required for OpenClaw web UI)
- Generate a reusable auth key with tags — enable both "Reusable" and "Ephemeral" (ephemeral nodes auto-remove when offline)
- Note your tailnet DNS name (e.g.,
tail12345.ts.net)
These are provisioned on the cloud instances via cloud-init — you do not need them locally:
- Docker, Node.js v22, OpenClaw CLI, coding agent CLI (e.g., Claude Code)
- Tailscale (agent-side)
- GitHub CLI, Brave Search, and other deps (per-identity)
- OpenClaw plugins: Linear, Slack (per-identity)
| Key | Required | Where to Get |
|---|---|---|
| Anthropic Credentials | Yes | API Key or OAuth token (claude setup-token) |
| Tailscale Auth Key | Yes | Tailscale Admin (reusable, with tags) |
| Slack Bot Token | No | Slack API — per agent |
| Linear API Token | No | Linear Settings — per agent |
| GitHub Token | No | GitHub Settings — per agent |
Two authentication methods are supported:
| Method | Token Format | Best For |
|---|---|---|
| API Key | sk-ant-api03-... |
Pay-as-you-go API usage |
| OAuth Token | sk-ant-oat01-... |
Pro/Max subscription (flat rate) |
The system auto-detects which type you provide and sets the correct environment variable.
For in-place updates that preserve Tailscale devices and existing infrastructure:
clawup redeployThis runs pulumi up --refresh to sync cloud state and apply changes. If the stack doesn't exist yet, it falls back to a fresh deploy automatically.
For local Docker containers:
clawup redeploy --localFor a clean rebuild (when in-place update can't recover):
clawup destroy -y && clawup deploy -yView your current configuration without opening the manifest file:
clawup config show # Human-readable summary
clawup config show --json # Full JSON outputModify config values with validation (no need to re-run init):
clawup config set region us-west-2
clawup config set instanceType t3.large
clawup config set instanceType cx32 -a atlas # Per-agent override
clawup config set volumeSize 50 -a atlas # Per-agent volumeRun clawup redeploy after changing config to apply.
Generated by clawup init. This manifest drives the entire deployment:
stackName: dev
provider: aws
region: us-east-1
instanceType: t3.medium
ownerName: Your Name
timezone: America/New_York
workingHours: 9am-6pm
secrets:
anthropicApiKey: "${env:ANTHROPIC_API_KEY}"
tailscaleAuthKey: "${env:TAILSCALE_AUTH_KEY}"
tailnetDnsName: "${env:TAILNET_DNS_NAME}"
tailscaleApiKey: "${env:TAILSCALE_API_KEY}"
agents:
- name: agent-pm
displayName: Juno
role: pm
identity: "https://github.com/your-org/army-identities#pm"
volumeSize: 30
secrets:
slackBotToken: "${env:PM_SLACK_BOT_TOKEN}"
slackAppToken: "${env:PM_SLACK_APP_TOKEN}"
plugins:
openclaw-linear:
agentId: agent-pm
slack:
mode: socket
- name: agent-researcher
displayName: Atlas
role: researcher
identity: "./my-identities/researcher"
volumeSize: 20The secrets section uses ${env:VAR} references — actual values are loaded from a .env file at init time. A .env.example is generated alongside the manifest. Model, backup model, and coding agent are configured in the identity (not the manifest). The manifest defines which agents to deploy and where.
Secrets are stored encrypted in Pulumi config, set automatically by clawup deploy. You can also manage them directly:
pulumi config set --secret anthropicApiKey sk-ant-xxxxx
pulumi config set --secret tailscaleAuthKey tskey-auth-xxxxx
pulumi config set tailnetDnsName tail12345.ts.netFor more advanced secret management, use Pulumi ESC. See esc/clawup-secrets.yaml.example for the full template.
clawup/
├── packages/
│ ├── core/ # @clawup/core — shared types, constants, registries
│ │ └── src/
│ │ ├── schemas/ # Zod schemas (source of truth for types)
│ │ ├── constants.ts
│ │ ├── identity.ts # Identity loader (Git repos, local paths)
│ │ ├── plugin-registry.ts
│ │ ├── coding-agent-registry.ts
│ │ ├── dep-registry.ts
│ │ └── skills.ts
│ ├── cli/ # clawup CLI (published npm package)
│ │ ├── bin.ts # Entry point (Commander.js)
│ │ ├── commands/ # init, deploy, redeploy, status, ssh, validate, destroy, config, list, push, secrets, webhooks, update
│ │ ├── tools/ # Tool implementations (adapter-based)
│ │ ├── lib/ # CLI-only: config, pulumi, ui, tailscale, exec
│ │ └── adapters/ # Runtime adapters (CLI vs API)
│ ├── pulumi/ # @clawup/pulumi — infrastructure as code
│ │ └── src/
│ │ ├── components/
│ │ │ ├── openclaw-agent.ts # AWS EC2 agent component
│ │ │ ├── hetzner-agent.ts # Hetzner Cloud agent component
│ │ │ ├── local-docker-agent.ts # Local Docker agent component
│ │ │ ├── cloud-init.ts # Cloud-init script generation
│ │ │ └── config-generator.ts # OpenClaw config builder
│ │ ├── shared-vpc.ts
│ │ └── index.ts # Main Pulumi stack program
│ └── web/ # Next.js dashboard (clawup-web)
├── examples/ # Example identities for reference
│ ├── identity/ # Minimal single-agent "researcher" example
│ └── multi-agent/ # Production 3-agent fleet (PM, Engineer, Tester)
├── docs/ # Documentation (Mintlify site + guides)
├── esc/ # Pulumi ESC secret templates
├── scripts/ # Shell script helpers
├── Pulumi.yaml # Pulumi project config (points to packages/pulumi/)
└── pnpm-workspace.yaml # Monorepo workspace config
- All agent ports bind to
127.0.0.1— access is via Tailscale only - No public port exposure; Tailscale Serve proxies traffic
- Token-based gateway authentication
- Secrets encrypted via Pulumi config
- Cloud-init scripts use environment variable interpolation
- SSH available as fallback for debugging
- Wait 3-5 minutes for cloud-init to complete
- Check logs:
clawup ssh <agent> 'sudo cat /var/log/cloud-init-output.log | tail -100' - Verify your Tailscale auth key is valid and reusable
clawup ssh <agent> 'openclaw gateway status'
clawup ssh <agent> 'journalctl -u openclaw -n 50'
clawup ssh <agent> 'openclaw gateway restart'- Check Tailscale is running locally:
tailscale status - Verify the agent appears in your tailnet
- Ensure you're using the correct tailnet DNS name
pulumi refresh # Refresh state from actual infrastructure
pulumi cancel # Force unlock if lockedFor contributing to Clawup itself:
git clone https://github.com/stepandel/clawup.git
cd clawup
pnpm install
pnpm build # Build all packages
pnpm test # Run all tests
# Individual packages
pnpm --filter @clawup/core build # Build core
pnpm --filter clawup build # Build CLI
pnpm --filter @clawup/pulumi build # Build Pulumi
pnpm --filter clawup-web dev # Web dev serverMIT