Enterprise Setup: OpenClaw for Teams & Companies¶
How to deploy, secure, and manage OpenClaw for company use. Includes security hardening, team architecture, and multi-agent orchestration.
Table of Contents¶
- Full Stack Requirements
- Installation
- Enterprise Architecture
- Security Hardening
- Team Management
- Company Use Cases
- Multi-Agent Deployment
- Maintenance Schedule
- Managed Services
- Enterprise Readiness Assessment
- Risk Register
Full Stack Requirements¶
Minimum¶
| Component | Requirement |
|---|---|
| OS | macOS (Apple Silicon), Linux, or Windows (WSL2) |
| Runtime | Node.js >= 22 |
| CPU/RAM | 2 vCPU / 4 GB RAM minimum |
| Docker | Recommended for isolation |
| LLM API Key | Anthropic (recommended), OpenAI, or others |
| Network | Internet access for LLM APIs |
Enterprise Stack¶
Infrastructure Layer:
├── VPS / Cloud VM / On-Prem Mac
├── Docker + Docker Compose
├── Reverse proxy (Caddy, nginx, Traefik) for HTTPS
└── Tailscale (recommended for secure remote access)
OpenClaw Layer:
├── Gateway process (port 18789)
├── Canvas server (port 18793, optional)
├── Docker sandbox containers per agent session
│ ├── Memory limit: 512MB per container
│ ├── CPU cores: 1
│ └── Process limit: 100
└── Token usage dashboard (built-in, v2026.2.6+)
Per-Agent Configuration:
├── Separate profiles per team member/function
├── Isolated state, config, workspace, port
├── AGENTS.md (operational rules)
├── SOUL.md (persona)
└── skills/ directory
Monitoring:
├── Token usage dashboard (built-in)
├── Gateway logs
├── Health check endpoints
└── Mission Control (community -- real-time monitoring UI)
Installation¶
Quick Start¶
# Option A: One-liner
curl -fsSL https://openclaw.ai/install.sh | bash
# Option B: npm
npm install -g openclaw
# Option C: Docker
bash <(curl -fsSL https://raw.githubusercontent.com/openclaw/openclaw/main/docker-setup.sh)
Onboarding¶
openclaw onboard
# Wizard guides you through:
# - Gateway setup
# - LLM provider config (API key or OAuth)
# - Workspace creation
# - Channel connection
# - First skill setup
Start¶
openclaw gateway # Start gateway
openclaw dashboard # Open web UI
openclaw chat # Terminal chat
openclaw agent --message "Hello" # One-shot message
Add Skills¶
Set Up Automation¶
# Daily morning briefing at 7am
openclaw cron add --name "Morning brief" --cron "0 7 * * *" --message "Weather, calendar, top emails"
# One-shot reminder
openclaw cron add --name "Follow up" --at "2h" --session main --system-event "Call the client"
Enterprise Architecture¶
Single-Agent (Solo/Small Team)¶
Multi-Agent (Department-Level)¶
┌─────────────────┐
│ Reverse Proxy │
│ (Caddy/HTTPS) │
└────────┬────────┘
│
┌───────────────┼───────────────┐
│ │ │
┌─────────▼──────┐ ┌─────▼──────┐ ┌──────▼─────────┐
│ Agent: Sales │ │ Agent: Ops │ │ Agent: Support │
│ Profile: sales │ │ Profile:ops│ │ Profile:support│
│ Port: 18790 │ │ Port:18791 │ │ Port: 18792 │
│ WhatsApp Biz │ │ Slack │ │ Telegram │
│ Claude Sonnet │ │ Claude Opus│ │ GPT-4o │
└────────────────┘ └────────────┘ └────────────────┘
Orchestrator Pattern (Company-Level)¶
Orchestrator Agent (strategic decisions, routing)
│
├── Sales Agent → WhatsApp Business
├── Ops Agent → Slack + GitHub
├── Support Agent → Telegram + Email
├── Coding Agent → Claude Code / Codex CLI
└── Analytics Agent → Internal dashboards
Security Hardening¶
Mandatory Steps (Do These First)¶
1. Update to Latest Version
2. Network Isolation - Bind OpenClaw to localhost only - Use reverse proxy (Caddy/nginx) for HTTPS - Use Tailscale for secure remote access - Block port 18789 from public internet - Firewall rules to restrict outbound connections
3. Authentication - Rotate ALL tokens and credentials if you ran a vulnerable version - Enable gateway token authentication - Use node pairing (approval + token) - Never browse untrusted pages while logged into Control UI - Use isolated browser profiles
4. Docker Isolation - Run in Docker containers with strict limits - Memory: 512MB, CPU: 1 core, Process: 100 - Use Docker secrets instead of environment variables - Separate containers per agent
5. Skill Vetting - Review source code before installing ANY skill - Check VirusTotal reports on ClawHub - Roll out new skills in small batches - Monitor logs after skill installation
6. Monitoring
# Health check
curl http://localhost:18789/health
# View logs
docker logs openclaw-gateway
# Security audit
openclaw security audit --deep --fix
Enterprise Security Tools¶
| Tool | Purpose |
|---|---|
| ClawGuard | Security middleware: permission manifests, sandboxing, audit logging |
| Clawctl | Managed hosting with RBAC (admin/operator/auditor), SIEM integration |
| NanoClaw | Security-hardened fork (~500 lines, fully auditable in 8 minutes) |
Security History (Know the Risks)¶
CVEs: - CVE-2026-25253 (CVSS 8.8): Visit malicious webpage → WebSocket hijacking → auth token stolen → sandbox disabled → full RCE. Patched v2026.1.20. - CVE-2026-25593: Remote code execution. Patched v2026.1.20. - v2026.2.14: Shipped 50+ security fixes.
Supply Chain: - 341 malicious skills on ClawHub (Atomic Stealer payloads). Skill scanner added v2026.2.6. - 15% of 18,000 community-scanned skills contain malicious instructions (r/MachineLearning).
Exposure: - 135,000+ exposed instances: Credentials accessible on public internet. - $750/mo runaway API costs from compromised instances reported.
Structural Risks (Not Patchable): - Palo Alto Networks: "Lethal trifecta" -- access to private data + exposure to untrusted content + external communications. - Prompt injection: Emails, web pages, documents can contain hidden instructions that agents follow. Kaspersky demonstrated email → private key theft. - Memory amplification: Injected prompts persist in agent memory, affecting all future conversations. - eSecurity Planet: "Risk stems from agent design rather than a patchable vulnerability."
Security researchers reporting: ZDNET, Cisco, CrowdStrike, Kaspersky, Trend Micro, Palo Alto Networks, Jamf Threat Labs, The Hacker News.
Bottom line: OpenClaw is safe to deploy IF you follow hardening steps. Run in Docker, bind to localhost, no community skills, enable sandbox+pairing mode, keep updated. See Troubleshooting > Security Issues for full mitigation guide.
Team Management¶
Current State (Feb 2026)¶
OpenClaw does not have built-in RBAC, SSO, or enterprise team management. This is a known gap (GitHub #8081).
What Exists Natively¶
- Multi-agent profiles (separate instances per team member/function)
- Per-agent auth configuration
- Per-agent session store (isolated conversations)
- Channel routing (different channels to different agents)
- Workspace isolation (separate directories per profile)
RBAC Workaround¶
Implement manually or via Clawctl:
| Role | Permissions |
|---|---|
| Admin | Global config, user management, view all logs |
| Developer | Use OpenClaw, view personal logs |
| Auditor | Read-only access to all logs (compliance) |
Managed Options for Teams¶
| Service | Features | Target |
|---|---|---|
| Clawctl | RBAC, SIEM integration, SOC2 Type I (Oct 2026 target) | Enterprise |
| SetupClaw | White-glove deployment for founders & execs | Startups |
| DigitalOcean | One-click deploy, security-hardened | Small teams |
Company Use Cases¶
Email Triage & Automation¶
- Before: 2+ hours daily sorting 50-100 emails
- After: OpenClaw scans inbox every 30 minutes, categorizes by urgency, drafts responses, sends Slack summary
- Result: 78% time reduction
Client Onboarding¶
- Before: 3-4 hours of admin per new client
- After: One message triggers: folder creation, emails, CRM updates, calendar invites, access provisioning
- Result: Under 15 minutes
Developer Workflows¶
- GitHub integration with cron jobs and webhooks
- Autonomous test running via Sentry webhook → error capture → auto-resolution → PR creation
- Code review automation
Customer Support (First-Line)¶
- Handles routine queries via WhatsApp/Telegram
- Escalates complex issues to humans
- 24/7 availability
Daily Operations¶
- Morning briefings (weather, calendar, top emails)
- Report generation and distribution
- CRM data management
- Meeting scheduling and follow-ups
Maintenance Schedule¶
| Task | Frequency | Time |
|---|---|---|
| Update OpenClaw version | Weekly/bi-weekly | 5 min |
| Rotate API keys/tokens | Monthly | 10 min |
| Review and update skills | Monthly | 15 min |
| Check gateway logs | Weekly | 10 min |
| Review cron job health | Weekly | 5 min |
| Patch Node.js runtime | Monthly | 10 min |
| Docker image updates | Monthly | 5 min |
| Skill allowlist review | As needed | 10 min |
Total monthly estimate: ~60 minutes. Annual: 12-15 hours.
Update Commands¶
# npm
npm update -g openclaw
# Docker (community image)
docker pull alpine/openclaw:latest && docker compose up -d
# Health check
curl http://localhost:18789/health
# List cron jobs
openclaw cron list
Managed Services¶
| Service | Price | What You Get |
|---|---|---|
| Clawctl | Paid (varies) | RBAC, SIEM webhooks, managed hosting, SOC2 targeting |
| SetupClaw | Paid | White-glove setup for non-technical founders |
| DigitalOcean | From ~$12/mo (droplet) | One-click deploy, declarative multi-agent definitions |
| ClawHosted | Paid | Managed OpenClaw on dedicated Mac Mini M4 hardware |
Enterprise Readiness Assessment¶
What OpenClaw HAS¶
- Open-source (MIT license, full commercial use)
- Self-hosted (complete data sovereignty)
- Multi-channel (13+ messaging platforms)
- Automation (cron, webhooks, heartbeats)
- Multi-agent routing
- Token usage monitoring
- Docker sandboxing
- Active development (8,664+ commits)
What OpenClaw LACKS (Out of the Box)¶
- RBAC / SSO
- Native audit logging
- SLA guarantees
- Compliance certifications (SOC2, HIPAA, ISO)
- Human-in-the-loop approval gates
- Enterprise support contracts
vs Enterprise Alternatives¶
| Feature | OpenClaw | Microsoft Copilot | NanoClaw |
|---|---|---|---|
| Open Source | Yes | No | Yes |
| Self-Hosted | Yes | No | Yes |
| RBAC | No | Yes | No |
| SSO | No | Yes (Azure AD) | No |
| Multi-Channel | 12+ platforms | Teams only | |
| Auditability | Low (430K+ lines) | N/A | High (~500 lines) |
| Cost | Free + API tokens | $30/user/month | Free + API tokens |
Risk Register¶
| Risk | Severity | Mitigation |
|---|---|---|
| Security surface area (430K+ lines) | High | Use Docker isolation, ClawGuard, NanoClaw for critical paths |
| Shadow AI (employees deploying without IT) | High | Establish AI Agent Policy before any deployment |
| Supply chain attacks (malicious skills) | High | Vet all skills, use scanner, restrict ClawHub |
| No native RBAC | Medium | Use Clawctl or implement custom RBAC |
| Single maintainer risk | Medium | Growing community, but monitor |
| Token cost runaway | Medium | Monitor dashboard, set budget alerts, limit cron frequency |
| API key exposure | High | Docker secrets, credential rotation, never expose ports publicly |
Compliance Considerations¶
GDPR (EU General Data Protection Regulation)¶
| Requirement | How It Applies to AI Agents | Implementation |
|---|---|---|
| Data minimization | Don't store more conversation data than needed | Configure session retention limits |
| Right to deletion | Users can request all data deleted | openclaw session delete --user <id> |
| Consent | Users must know they're interacting with AI | Bot disclosure in channel descriptions |
| Data processing agreement | Required if using cloud LLM APIs | Sign DPAs with Anthropic, OpenAI, etc. |
| Data residency | Data may not leave EU | Use EU API endpoints or local models |
| Purpose limitation | Only use data for stated purpose | Restrict agent skills and data access |
Key risk: Every message sent to a cloud LLM API leaves your infrastructure. For GDPR-sensitive data, use local models (Ollama, vLLM) or providers with EU data centers.
HIPAA (Healthcare)¶
| Requirement | Implementation |
|---|---|
| BAA required | Sign Business Associate Agreement with LLM provider |
| PHI protection | Never send Protected Health Information to non-BAA providers |
| Audit logging | Enable full request/response logging |
| Access controls | Implement RBAC (via Clawctl or custom) |
| Encryption | HTTPS in transit, encrypted at rest |
Current state: Anthropic and OpenAI offer BAAs for enterprise accounts. Most open-source LLM providers do not. Self-hosting with local models is the safest HIPAA path.
SOC 2¶
| Control | How to Meet It |
|---|---|
| Access control | Gateway token auth + Tailscale VPN |
| Encryption | HTTPS via Caddy/nginx, encrypted Docker volumes |
| Monitoring | AgentOps + Crabwalk + gateway logs |
| Incident response | openclaw-shield for secret detection + alerts |
| Change management | Git-based config, PR reviews for skill changes |
Timeline: Clawctl targeting SOC 2 Type I by October 2026.
EU AI Act (Effective Aug 2025)¶
| Risk Level | What It Means | AI Agent Impact |
|---|---|---|
| Minimal | No obligations | Basic chatbots, content generation |
| Limited | Transparency required | Must disclose AI interaction to users |
| High | Compliance framework required | HR, legal, healthcare, financial agents |
| Unacceptable | Banned | Social scoring, real-time biometric surveillance |
Most OpenClaw deployments are "Limited risk" -- requiring only transparency (tell users they're talking to AI). Enterprise deployments in HR, healthcare, or finance may be "High risk" and need conformity assessments.
Compliance Checklist¶
- [ ] Data processing agreements signed with all LLM providers
- [ ] Session retention policy configured (auto-delete after X days)
- [ ] AI disclosure in all user-facing channels
- [ ] RBAC implemented (even if manual via profiles)
- [ ] Audit logging enabled
- [ ] HTTPS enforced for all external access
- [ ] API keys stored as Docker secrets (not env vars)
- [ ] Regular security audits (
openclaw security audit --deep) - [ ] Incident response plan documented
- [ ] Staff trained on AI agent data handling
Enterprise Adoption Signals (Feb 2026)¶
YC-Backed Startups¶
"YC backing startups that turn OpenClaw into enterprise AI employees is a massive signal. OpenClaw isn't just a dev tool anymore — it's becoming infrastructure for entire business operations. Support, engineering, sales running 24/7." -- @Pritesh
Enterprise Governance Gap¶
"OpenClaw for the enterprise has just begun to arrive. It emerged out of sheer necessity. Once workers try to use agents to run workflows, touch credentials, access systems of record + act for the business, then security, governance suddenly becomes basic survival." -- @dhinchcliffe
The Next Race¶
"The next milestone race: whoever provides the agent cloud with shared workspace memory, skills, and team access (ie. openclaw enterprise). There is also a proactive element that will continue to grow on seeking out how a business ticks and mapping it." -- @bsheldonx
Enterprise Self-Build Pattern¶
@haldas demonstrates the current enterprise pattern: 1. 4 Claude Code workers specialized by system/function 2. 1 Enterprise manager Claude orchestrating all workers 3. Cross-system communication between Claudes for integrated operations 4. SaaS elimination: $35K/yr in recurring fees replaced by AI-written custom tools 5. Key benefit: "I will be able to customize operations 100% how I want, very quickly"
Enterprise Security Requirements (from @PrzemyslawKlys)¶
"My goal is for it to be more 'secure' by design and more guardrailed than OpenClaw, but allowing flexibility to build your own tools, with strict 'write' paths. You still have to 'approve' usage of ChatGPT Business, Enterprise or maybe GitHub Copilot subscription to be having access to this data."
Recommended Enterprise Architecture¶
┌─────────────────────────────────────────────┐
│ ENTERPRISE GATEWAY │
│ Tailscale VPN + Cloudflare Tunnel + HTTPS │
├─────────────────────────────────────────────┤
│ Agent Profiles (per function): │
│ ├── Sales Agent (port 18790) │
│ ├── Ops Agent (port 18791) │
│ ├── Support Agent (port 18792) │
│ └── Research Agent (port 18793) │
├─────────────────────────────────────────────┤
│ Model Routing (ClawRouter): │
│ ├── Complex → Claude Opus 4.6 │
│ ├── Routine → Kimi K2.5 or GLM-5 │
│ └── Heartbeat → Haiku 4.5 or Gemini Flash │
├─────────────────────────────────────────────┤
│ MCP Tools (vetted only): │
│ ├── Browser automation (CDP native) │
│ ├── Git operations │
│ └── Custom internal tools │
├─────────────────────────────────────────────┤
│ Security: │
│ ├── LiteLLM proxy (credential isolation) │
│ ├── Docker sandboxing │
│ ├── openclaw security audit (post-config) │
│ └── No public port exposure │
└─────────────────────────────────────────────┘