Skip to main content

NemoClaw Guide: Enterprise-Grade Security for OpenClaw

Discover NemoClaw, NVIDIA's enterprise security layer for OpenClaw. Learn how to deploy safe, auditable AI agents with sandboxing and privacy controls in this complete setup guide.
Mar 31, 2026  · 8 min read

OpenClaw is arguably the most popular agentic tool so far in 2026. However, as we highlight in our OpenClaw guide, it has some serious security vulnerabilities that enterprises and individuals can’t afford to ignore. 

Many of the issues stem from the fact that giving any autonomous agent broad access to your system without restrictions can lead to serious problems, as we saw when OpenClaw went rogue and deleted the entire inbox for a Meta AI executive. 

OpenClaw’s security challenges have even been raised by top security firms such as CrowdStrike. Given the massive popularity of the tool, NVIDIA saw this as an opportunity to create a solution and continue asserting its dominance in the AI space. They called the tool NemoClaw. 

In this article, I will take you through what the tool is, what it does, and NVIDIA's vision for a secure agentic tool. 

What Is NemoClaw?

NemoClaw is a secure runtime layer that sits on top of OpenClaw to control the agent's actions. The agent can still write code, browse the web, and manage files, but its actions now go through policy checks enforced by NVIDIA's OpenShell runtime. 

OpenShell provides sandboxed execution environments for protecting your data and infrastructure using policies that are defined in YAML files. The policies prevent unauthorized network activity, access to certain files, and data exfiltration. 

NemoClaw Key Features and Capabilities

Let’s start with enterprise-grade security. With OpenShell, the agent’s actions have to pass through existing policies. If a specific command is not allowed, it is flagged for manual review. 

Next is hybrid deployment during setup. NemoClaw allows you to choose between using a local model and API-based cloud providers such as OpenAI and Anthropic. 

NemoClaw also natively integrates with NVIDIA's Nemotron model family. They provide Nemotran 3 Super 12b-a12 as an option during setup, and you can use it for free with an NVIDIA API key. 

You can discover how Nemotron 3's architecture enables efficient AI agent coordination and reduces inference costs from our Nemotron 3: Architecture, Benchmarks, and Open-Model Comparisons tutorial

NemoClaw key features and capabilities

The pros and cons of NemoClaw

SecurityScorecard's research from February 2026 found tens of thousands of exposed OpenClaw instances. This research validates the fact that a secure way of setting up OpenClaw is needed. 

The security layer of NemoClaw via OpenShell ensures that your agent will not perform any tasks that are not already allowed. 

As you can see from the image below, NemoClaw allows you to choose some policies via the provided presets when setting up. 

Next, the idea that you can set up a secure OpenClaw via a single command makes it easy for people to configure their agents. 

I recommend checking out how to set up OpenClaw and talk to the agent on WhatsApp from our OpenClaw Tutorial.

NemoClaw is alpha software at the moment, so it is not production-ready. The sandbox environment is also fully supported only in Linux, with partial support for macOS and Windows, requiring WSL2. 

NemoClaw also requires at least 8GB of RAM and at least 4 vCPUs to run without memory issues. Although natively supported, running the 120B Nemotron model locally requires powerful GPUs that are not accessible to everyday users. 

Running NemoClaw for daily use is also incredibly difficult. When running it, I bumped into numerous permission issues that a normal OpenClaw user wouldn’t know how to fix. This is more of a business tool where there are people to configure and monitor these permission policies. 

The pros and cons of NemoClaw

Setting Up NemoClaw

Let’s look at how to install NemoClaw.

Installation (single-command setup)

The installation of NemoClaw can be done by running a single command on the terminal:

 
curl -fsSL https://www.nvidia.com/nemoclaw.sh | bash

This will download and run the installation script, which sets up all the required dependencies. 

Configuring your environment (local vs cloud routing)

Once installation is complete, type nemoclaw onboard  to launch an onboarding wizard that walks you through the process of configuring your sandbox and setting security polices. It will allow you to: 

  • Choose the inference provider. The options are the NVIDIA API endpoint or a local Ollama model. 
  • Name your sandbox.
  • Configure allowed policies such as Telegram and Discord. 

Discover how to set up and use local models with OpenClaw in our Using OpenClaw with Ollama tutorial. 

Running your first sandboxed agent

Once onboarding is complete, you can interact with your agent using the sandbox you configured above. First, you need to connect to it: 

nemoclaw sand_box_name connect

You can now talk to the OpenClaw agent inside the sandbox: 

 openclaw agent --agent main --local -m "Who is the founder of NVIDIA?"
🦞 OpenClaw 2026.3.11 (29dc654) — Hot reload for config, cold sweat for deploys.
NVIDIA was founded in 1993 by three engineers:
- **Jensen Huang** (CEO)
- **Chris Malachowsky**
- **Curtis Priem**
Jensen Huang is the most publicly recognized co‑founder and has served as the company’s CEO since its inception.

You can also run openclaw onboard inside the sandbox to configure your favorite messaging platform, such as Telegram.

NemoClaw's Standout Capabilities

There are a few key differences between NemoClaw and OpenClaw. Let’s discuss those in this section. 

The OpenShell runtime

NemoClaw uses the OpenShell runtime to block unauthorized network connections and restrict file input and output operations to specific folders. It also blocks all outbound connections apart from those you have allowed. This prevents the agent from potentially getting a prompt injection from a malicious website. 

NemoClaw also restricts reads and writes to the sandbox environment and prevents privilege escalation. 

This feature ensures that the agent can’t try to grant new permissions apart from those already given. You can achieve similar results while using OpenClaw in a Docker environment, but NemoClaw’s approach is stricter, while giving you the option to approve individual requests. 

Human-in-the-loop approvals

With NemoClaw, you have to manually approve any request that is not already allowed by the policy. When, for example, OpenClaw tries to ping an endpoint that is not allowed, OpenShell will block the request and provide a prompt on the terminal for you to approve.  

Privacy routing and local AI

When you are setting up NemoClaw, you get the option to use it with Nemotron 3 Super 120B locally or with an NVIDIA API. This means you can use the model for free if you have the hardware to run it locally. 

The NVIDIA API also provided limited free usage. Local models are a strong selling point for industries with strict privacy concerns, such as healthcare. Like OpenClaw, NemoClaw is model agnostic, meaning you can use it with any of the supported local or API-based providers. 

Policy-driven guardrails

By default, NemoClaw has strict policies that prevent the agent from executing dangerous code or leaking sensitive data. 

The policies are defined in YAML files, which you can edit to adjust or add new policies. When an action is rejected, you can allow it, and it will only persist within that session. To make it permanent, you will have to edit the policies. 

For example, as you can see in the image below, the LiteLLM Python package was compromised, leaving thousands of users vulnerable. 

With NemoClaw running in a sandbox and policies that control access to certain folders in a computer, it would be impossible for this compromised package to grab all your credentials and dump them online. 

LiteLLM COMPROMISED Twitter Post

NemoClaw Limitations and Caveats

NemoClaw can be used to automate research using sensitive enterprise data. The agent can summarize internal documents and create reports without the data ever leaving the sandbox. 

Network policies ensure that the agent can access only approved services, and file system restrictions prevent it from accessing files outside the sandbox. 

However, NemoClaw has the following limitations: 

  • It is an early-stage Alpha software that is not ready for production. 
  • The API might change as the software is being actively built, so there could be breaking changes. 
  • Running the huge Nemotron model or other open-source models for local inference is challenging if you don't have the required hardware. 
  • There is limited operating system support, with Linux being the only one that's fully supported at the moment.
  • For the everyday user, the security policies can be too restrictive, requiring making changes to permissions or loosening the polices for simple tasks. 

NemoClaw Limitations and Caveats

Future Outlook

During this year's GTC keynote, Jensen Huang compared OpenClaw to Linux, stating that OpenClaw achieved in a few weeks what Linux did in 30 years. According to him, every company should have an OpenClaw strategy. 

The Rise of OpenClaw compared to other opensource projects

Given that every company needs an agentic computing strategy, the potential for OpenClaw is huge. 

But that comes with serious challenges around security. 

When I was setting up my own OpenClaw, I had to set it up in a Docker with limited permissions and an inability to escalate privileges.  

The security issues for OpenClaw are not just limited to businesses; even normal users have to look at OpenClaw’s security seriously. 

Therefore, NemoClaw will likely evolve into a product that even normal users can use to secure their installations, not just businesses.  This will make it possible for people to comfortably run OpenClaw on their personal computers without the need to purchase another computer to prevent harm to their main computer. 

Conclusion

The fact that an agentic tool like OpenClaw needs guardrails to prevent it from executing dangerous commands is not debatable. 

We have seen numerous supply chain attacks recently, like the one with LiteLLM, to convince everyone that they can't afford to run an agent without restrictions. 

The only question is if NemoClaw will be the tool that we all use to secure those OpenClaw installations. That remains to be seen as the tool is developed further and enters a stable release. 

To learn more about working with AI tools, I recommend checking out our guide to the best free AI tools. For broader AI coding skills, try our AI-Assisted Coding for Developers course to develop the skills that make AI assistants more reliable partners in your development workflow. 

You can also discover how to build AI-powered applications using LLMs, prompts, chains, and agents in LangChain from our Developing LLM Applications with LangChain course.

NemoClaw FAQs

What is NemoClaw, and how does it relate to OpenClaw?

NemoClaw is NVIDIA's open-source security and governance layer built on top of OpenClaw. It does not replace OpenClaw but makes OpenClaw more secure.

Does NemoClaw require NVIDIA hardware to run?

 No. NemoClaw can run on any dedicated platform, including RTX PCs, DGX Station, and DGX Spark systems.

How does NemoClaw handle security at the agent level?

Policy enforcement runs out-of-process; it executes outside the agent's address space, in a separate process that the agent cannot access, modify, or terminate. This means a compromised agent cannot override its own security controls.

What models does NemoClaw support?

NemoClaw lets you run open-source models like NVIDIA NeMoTron locally on your dedicated system.

Is NemoClaw ready for production use?

Not yet. NemoClaw is available in early preview starting March 16, 2026. This software is not production-ready. Interfaces, APIs, and behavior may change without notice as the project evolves.


Derrick Mwiti's photo
Author
Derrick Mwiti
Topics

Top AI Courses

Course

Designing Agentic Systems with LangChain

3 hr
10.3K
Get to grips with the foundational components of LangChain agents and build custom chat agents.
See DetailsRight Arrow
Start Course
See MoreRight Arrow
Related

blog

Top OpenClaw Alternatives: From Local to Enterprise AI Agents

Explore OpenClaw alternatives in 2026, from Nanobot and n8n to AWS Bedrock Agents. Learn how to pick the right tool for secure and scalable agentic workflows.
Austin Chia's photo

Austin Chia

12 min

blog

OpenClaw vs Nanobot: Which AI Agent Framework Should You Use in 2026?

OpenClaw vs Nanobot: Compare the full-featured OpenClaw agent with the minimal 4,000-line Nanobot. We break down features, security, and setup to help you choose.
Derrick Mwiti's photo

Derrick Mwiti

9 min

blog

OpenClaw vs Claude Code: Which Agentic Tool Should You Use in 2026?

Claude Code vs OpenClaw: Compare Anthropic's secure coding CLI with the open-source OpenClaw. We analyze features, security risks, and pricing to help you choose.
Derrick Mwiti's photo

Derrick Mwiti

8 min

Tutorial

OpenClaw Security: Best Practices For AI Agent Safety

Learn how to secure your OpenClaw deployment. Discover essential best practices for container hardening, network isolation, and protecting autonomous AI agents.
Austin Chia's photo

Austin Chia

Tutorial

Nanobot Tutorial: A Lightweight OpenClaw Alternative

Discover Nanobot, the lightweight OpenClaw alternative. Build a secure, auditable Python AI agent in under 10 minutes with this complete setup guide.
Derrick Mwiti's photo

Derrick Mwiti

Tutorial

Building Custom OpenClaw Skills: A Hands-On Tutorial

Learn how to build OpenClaw skills from scratch, connect external APIs, configure Docker sandboxing, and publish to ClawHub in this step-by-step tutorial.
Bex Tuychiev's photo

Bex Tuychiev

See MoreSee More