Experimental pack. NemoClaw combines multiple upstream projects (OpenClaw, NVIDIA OpenShell, bedrockify). Expect rough edges as these components evolve independently.
What makes NemoClaw different
- OpenShell sandbox. NVIDIA’s OpenShell applies Landlock (filesystem), seccomp (syscalls), and network namespace isolation to the agent container. An agent running malicious or misconfigured code inside NemoClaw cannot touch your AWS resources.
- Bedrock via bedrockify on the host. Inference calls exit the sandbox through a controlled path to bedrockify running on the host EC2 instance. The sandbox blocks all other outbound AWS API calls.
- Same OpenClaw interface. You interact using the same
openclawTUI and commands as the non-sandboxed pack. Persistent memory lives in~/.openclaw/on an 80 GB data volume. - Requires Docker and t4g.xlarge. The OpenShell sandbox runs inside Docker with cgroup v2 configuration. The pack installs Docker automatically, but the instance must have at least 4 vCPUs and 8 GB of RAM.
Compatible profiles
| Profile | Supported | Reason |
|---|---|---|
personal_assistant | Yes | Bedrock-only IAM; sandbox blocks AWS API access |
account_assistant | No | Sandbox blocks the AWS API calls this profile is meant to make |
builder | No | Sandbox blocks the AWS API calls this profile is meant to make |
Prerequisites
- AWS CLI configured with admin access in a dedicated sandbox account
- Amazon Bedrock model access enabled in your target region (default:
us-east-1) - Must use
--profile personal_assistant— the installer will fail with any other profile - Instance must be at least
t4g.xlarge(4 vCPUs, 8 GB RAM minimum for the sandbox) - Docker is installed automatically by the pack if not present
Install
Docker install and cgroup v2 configuration
Installs Docker (if absent), configures
default-cgroupns-mode: host for cgroup v2 compatibility, and adds ec2-user to the docker group.bedrockify health check
Confirms bedrockify is running on port 8090 (installed automatically as a dependency).
NemoClaw and OpenShell install
Downloads and runs NVIDIA’s installer, which installs NemoClaw and OpenShell.
Sandbox creation
Runs
nemoclaw onboard non-interactively to create the sandbox named loki-assistant, pointing inference at http://127.0.0.1:8090/v1 (bedrockify on the host).Connect and use
After the stack deploys, SSM into the instance and interact with the sandbox:Configuration options
| Parameter | Default | Description |
|---|---|---|
--region | us-east-1 | AWS region for Bedrock |
--model | us.anthropic.claude-sonnet-4-6 | Bedrock model ID (routed via bedrockify) |
--bedrockify-port | 8090 | Port where bedrockify listens on the host |
--sandbox-name | loki-assistant | Name of the OpenShell sandbox |
--telegram-token | — | Optional Telegram bot token for the bridge |
--allowed-chat-ids | — | Comma-separated Telegram chat IDs |
Security model
The OpenShell sandbox enforces isolation at three layers:Landlock (filesystem)
Landlock (filesystem)
Restricts which paths the sandboxed process can read or write. The agent cannot access host OS paths outside the permitted sandbox workspace.
seccomp (syscalls)
seccomp (syscalls)
Filters which Linux system calls the sandboxed process can make. Dangerous or unnecessary syscalls are blocked at the kernel level.
Network namespace isolation
Network namespace isolation
The sandbox runs in its own network namespace. All outbound network traffic is routed through a controlled path — only Bedrock inference via the host bedrockify proxy is permitted. Direct AWS SDK calls (EC2, IAM, S3, etc.) are blocked.
- Enumerate EC2, IAM, or S3 resources
- Assume IAM roles
- Make non-Bedrock AWS API calls
- Access host filesystem paths outside the sandbox
- Call Bedrock
InvokeModelvia bedrockify on the host - Read and write files within the sandbox workspace
- Use the Telegram bridge (if configured)
Resource requirements
| Personal assistant | |
|---|---|
| Instance type | t4g.xlarge (minimum — 4 vCPUs, 8 GB RAM required) |
| Root volume | 40 GB |
| Data volume | 80 GB |
Notes and limitations
- NemoClaw is the only pack that requires Docker. The pack installs it automatically, but the instance must support Docker (all Lowkey-supported AMIs do).
- The sandbox manages its own lifecycle — there is no systemd service to check. Use
nemoclaw <sandbox-name> statusto inspect the sandbox state. - Tearing down the CloudFormation or Terraform stack deletes the sandbox and the 80 GB data volume. Back up any important workspace files before tearing down.
- If you need Bedrock access without the sandbox, use the standard OpenClaw pack with
personal_assistant.