Announced at NVIDIA GTC · March 16, 2026

NemoClaw: NVIDIA's Security Stack for OpenClaw Autonomous Agents

What is NemoClaw?

NemoClaw is NVIDIA's open-source security reference stack that sandboxes the OpenClaw autonomous AI agent inside a controlled environment governed by the OpenShell secure runtime. It enforces policy-based privacy, network egress controls, and intent verification — preventing shell-level exploits and data exfiltration attacks.

2.3M+

Monthly OpenClaw searches

5

Security isolation layers

Mar 2026

GTC announcement date

Open Source

MIT licensed reference stack

What Is NemoClaw?

NemoClaw is an open-source security reference stack from NVIDIA that wraps the OpenClaw autonomous agent inside an isolated, policy-governed sandbox. It uses NVIDIA's OpenShell secure runtime to control what the agent can access, execute, and communicate — without removing its core capabilities.

OpenClaw gained mass traction as an autonomous AI agent capable of operating directly on a user's local hardware or cloud infrastructure. Because it can run shell commands, interact with files, and browse the web, developers recognized extreme security risks for enterprise environments.

NVIDIA answered this by developing NemoClaw — wrapping the OpenClaw agent inside a controlled sandbox governed by the OpenShell secure runtime. OpenShell sits between the agent and the underlying infrastructure, controlling exactly what the agent can access, execute, and where model calls are sent.

NemoClaw works as a plugin that integrates with the OpenClaw terminal and a blueprint that orchestrates all resources through OpenShell. Every action the agent proposes is verified against an operator-defined YAML policy file before execution is permitted.

Full technical explanation of NemoClaw →

NemoClaw vs OpenClaw

CapabilityOpenClawNemoClaw
Shell command executionUnrestrictedPolicy-gated
File system accessFull host accessLandlock sandboxed
Network outboundUnrestrictedAllowlist only
PII handlingNo strippingPrivacy router active
Intent verificationNonePer-action policy check
Production readyReference onlyAlpha — not yet
Full OpenClaw vs NemoClaw deep-dive →

NemoClaw Security Architecture

NemoClaw implements five distinct security layers between the OpenClaw agent and the underlying infrastructure. Each layer addresses a specific attack surface — from raw file system access to cloud model data leakage. All layers operate under the OpenShell runtime policy enforcement engine.

Security LayerMechanism of ProtectionVulnerability Addressed
Sandboxed ExecutionIsolated containers with Landlock + seccomp filtersPrevents direct access to host file system or adjacent processes
Network Egress ControlAll outbound connections blocked unless explicitly approved by operator policyPrevents data exfiltration attacks where agents phone home
Minimal-Privilege AccessLeast-privilege principles enforced per individual agent instanceOne compromised agent cannot inherit permissions of another
Privacy RouterStrips personally identifiable information before cloud model callsPrevents leakage of sensitive user data to third-party cloud models
Intent VerificationValidates agent's proposed actions against operator-defined policyForces injection attacks to produce an in-policy action to succeed

Install NemoClaw

NemoClaw supports Linux natively via a single installer script. macOS requires Docker Desktop or Colima. Windows users must first install WSL2, then use the Docker Desktop backend. A remote VM path is available for teams requiring GPU inference at cloud scale.

The fastest path is Linux with Docker running and at least 8 GB of RAM:

# Linux — fastest install path
curl -fsSL https://www.nvidia.com/nemoclaw.sh | bash

# Verify installation
nemoclaw --version

# Connect your first assistant
nemoclaw my-assistant connect

# Launch the OpenClaw terminal UI
openclaw tui
Complete multi-OS install guide →

Supported Installation Paths

Operating SystemPrerequisitesStatus
LinuxDocker + 8 GB RAMSupported
macOS (Apple Silicon)Docker Desktop / ColimaSupported
WindowsWSL2 + Docker DesktopSupported
Remote VM (Ubuntu)24 GB VRAMGPU Required
GitHub CodespacesFree tierCloud Deploy
Windows WSL2 step-by-step guide →

Known Security Gaps in NemoClaw Alpha

NemoClaw is alpha software and is not production-ready. Its intent verification layer focuses on proposed actions rather than content returned by external tools, creating an attack surface for indirect prompt injection, policy drift, multi-turn erosion, and supply chain threats via community skills.

Security GapTechnical MechanismMitigation Strategy
Indirect Prompt InjectionMalicious data from trusted sources bypasses intent verification by entering the agent reasoning chainSanitize all context windows before execution; treat external tool outputs as untrusted input
Policy Definition QualityOverly permissive YAML operator policies allow attacks to pass through intent verificationUse hardened baseline policy templates; enforce policy review before any deployment
Multi-Turn ErosionIntent verification validates per-action only — not cumulative behavioral patterns across sessionsIntegrate continuous state audits; monitor behavioral drift across multi-turn agent sessions
Supply Chain AttacksVulnerable community-built third-party skills on ClawHub can compromise the agent environmentUse only vetted skills; pin skill versions; review source code before enabling any skill
Full security hardening and red team guide →

Frequently Asked Questions About NemoClaw

What is NemoClaw?

NemoClaw is an open-source security reference stack released by NVIDIA at the GTC conference on March 16, 2026. It wraps the OpenClaw autonomous AI agent inside a sandboxed environment governed by NVIDIA's OpenShell secure runtime, providing policy-based privacy guardrails and network egress controls.

What is the difference between NemoClaw and OpenClaw?

OpenClaw is the core autonomous agent platform — it operates on a user's local hardware, runs shell commands, interacts with files, and browses the web. NemoClaw is the security layer built on top of OpenClaw. It adds Landlock sandboxing, intent verification, and a privacy router to prevent data exfiltration and unauthorized access.

Is NemoClaw production-ready?

No. As of April 2026, NemoClaw is alpha software. Known gaps include susceptibility to indirect prompt injection attacks and reliance on well-crafted operator policy YAML files. It is intended as a reference stack, not a hardened production deployment.

How do I install NemoClaw on Linux?

Ensure Docker engine is running and you have at least 8 GB of RAM, then run: curl -fsSL https://www.nvidia.com/nemoclaw.sh | bash. For Windows, install WSL2 first via PowerShell as Administrator.

What is openclaw?

OpenClaw is an autonomous AI agent platform that acts as an operating system for personal AI. It can run shell commands, interact with files, browse the web, and take proactive actions across a user's machine. Because of these broad capabilities, NVIDIA developed NemoClaw as a secure runtime wrapper around it.

Ready to run NemoClaw?

Follow the complete installation guide for your operating system. Linux, macOS, Windows WSL2, remote VMs, and GitHub Codespaces all supported.