NEW VIDEO · MADE BY AGENTS

Your AI Agent
Could Wreck Your Server. Lock It Down.

Default Open Claw has full filesystem access, full network access, and root over every command. One stray prompt and you've leaked credentials. Here's the 5-layer stack I run for my own AI employees.

5 SECURITY LAYERS 7 FORKS COMPARED 0 PUBLIC PORTS

Most self-hosted AI agent tutorials skip the boring part: hardening the box they run on. That's also the part that decides whether your agent is a fun demo or a production AI employee. This walkthrough is the exact setup, step by step, on a fresh VPS.

Nemo Claw
Open Claw, sandboxed
Open Shell
Nvidia isolation
YAML Policies
Allow-list everything
🚨

The Security Nightmare

PART 01 · WHY YOU SHOULD CARE

Out of the box, an Open Claw agent can read every file on your server, hit any URL on the internet, and execute any shell command it decides is useful. That is one prompt away from data exfiltration, ransomware-style damage, or a leaked API key dump.

I open the video with the threat model so you understand what each layer of the stack is actually defending against. If you skip this part, the rest of the config feels arbitrary. It's not.

open-claw threat-model credentials exfiltration
Watch this segment →
🔱

Picking The Right Fork

PART 02 · 7 VARIANTS COMPARED

The community has shipped a whole family of Open Claw forks: nanobot for hacking, nanoclaw for Docker isolation, zero claw for raw speed, pico claw and null claw for Raspberry Pi. Each one trades something off.

I walk through all of them and explain why Nemo Claw is the strongest pick for production: it locks the original Open Claw inside Nvidia's Open Shell sandbox and exposes everything via YAML policies you control.

nemoclaw nanoclaw zero-claw pico-claw nanobot
Watch this segment →
🛡️

The 5-Layer Stack

PART 03 · BOTTOM TO TOP

Fresh Ubuntu 24.04 base. Tailscale VPN plus UFW firewall so SSH is reachable only inside your private mesh. Cloudflare Tunnel on top so no public IP is ever exposed. Nvidia Open Shell sandbox running the agent itself. YAML policies defining every allowed action.

Each layer has a job and you can see exactly what gets blocked when one fails. Defense in depth, applied to AI agents.

tailscale cloudflare-tunnel ufw sandbox yaml-policy
Watch this segment →

Live Install, Wired To Telegram

PART 04 · END TO END

Spin up a Hetzner VPS, install Docker, lock SSH behind Tailscale, set up the Cloudflare tunnel, then drop Nemo Claw inside Open Shell. Wire it to Gemini and Telegram via BotFather. Stress-test the policies by asking the agent for credentials (denied) and to write a one-pager (allowed, after editing the YAML).

Every command is on screen. By the end you have a hardened, always-on AI employee you can actually trust on a real server.

hetzner docker telegram gemini claude-code
Watch this segment →
↳ THE KEY INSIGHT

An unrestricted agent on an open server is a credential leak waiting for the right prompt. The 5-layer stack flips the default from "can do anything" to "can do exactly what I allow." That's the whole difference between a weekend demo and a production AI employee.


Hit play, and let me know in the comments which Open Claw variant you'd run for your own setup, the original for max power, Nemo Claw for production, or one of the smaller forks for an edge device. I read every comment. See you in the next one.

Keep Reading