NVIDIA NemoClaw: The Complete Guide
— From Zero to Expert in 20 Minutes
By the end of this guide you'll know exactly how to deploy secure, always-on AI agents with enterprise privacy guardrails — in a single command.
nemoclaw onboardWhat is NVIDIA NemoClaw?
NemoClaw is NVIDIA's open-source security and privacy layer built on top of OpenClaw — the "operating system" for personal AI agents. Think of it as a hardened runtime that lets autonomous AI agents operate freely, but always within guardrails you control.
If you've heard of OpenClaw — the popular framework for building and running autonomous AI agents locally — NemoClaw is its security-hardened cousin. While OpenClaw gives agents immense power to browse the web, write code, manage files, and call APIs, it was built for speed and capability, not for environments where data privacy and security matter. NemoClaw fixes that.
Launched on March 16, 2026, NemoClaw installs NVIDIA's new OpenShell runtime, which sandboxes every agent at the process level — locking down file access, controlling network connections, and enforcing policy-based guardrails over data handling and inference routing. You get all the power of OpenClaw with none of the enterprise security nightmares.
How NemoClaw Compares
Why NemoClaw in 2026?
Four powerful forces are converging right now to make NemoClaw the most important new AI tool for developers and enterprises alike.
Key Features
NemoClaw packages several powerful components into a single installable stack. Here's everything it ships with and why each feature matters.
/sandbox and /tmp, with all other paths blocked by default. This single feature eliminates an entire class of data-exfiltration risks.curl -fsSL nvidia.com/nemoclaw.sh | bash then nemoclaw onboard — that's it. The onboarding command downloads the blueprint, verifies the artifact, determines resource requirements, creates the sandbox container, and starts the agent. Under 5 minutes from zero to running agent.Complete Setup Guide: From Zero to Running Agent
Follow these 10 steps exactly and you'll have a secure, always-on NemoClaw agent running in under 20 minutes — even if you've never touched OpenClaw before.
sudo fallocate -l 8G /swapfile && sudo mkswap /swapfile && sudo swapon /swapfile to create 8 GB of swap first.
nvidia.com/nemoclaw.sh and is checksummed — do not pipe from any unofficial mirror.
nemoclaw --version to confirm the binary is in your PATH. If the command isn't found, run source ~/.bashrc (or ~/.zshrc) to reload your shell environment.
nemoclaw onboard
~5 minutes
nemoclaw onboard, NemoClaw performs a sequence of automated steps: (1) downloads and cryptographically verifies the blueprint artifact from NVIDIA's artifact registry, (2) determines what OpenShell resources your hardware can support, (3) creates the sandboxed container with embedded privacy policies baked in, and (4) starts routing inference through your local GPU. Watch the terminal — each step is logged. The whole process typically takes 3–8 minutes depending on your download speed and GPU.
nemoclaw onboard --blueprint v0.1.0) and every installation will behave identically — critical for reproducible enterprise deployments.
http://localhost:3000. You'll land on the NemoClaw dashboard — built on the OpenClaw web interface but extended with NemoClaw's security panels. The left sidebar shows your running agents, the top nav has tabs for Overview, Install, Features, Community, and the main panel shows your agent's current status, active policies, and recent activity log.
http://localhost:3000 immediately. NemoClaw doesn't add a desktop shortcut by default. If you want it to auto-open on login, add nemoclaw start && xdg-open http://localhost:3000 to your startup scripts.
default-secure policy already applied. Click on it to inspect its rules. The policy editor lets you define: which file paths agents can read/write, which network domains are pre-approved, whether PII detection and masking is active, and how inference is routed (local-only vs. cloud-allowed). Start with the defaults — they're conservative but fully functional.
nemoclaw policy set <profile-name> from the terminal.
nemoclaw-agent-1 by default). The chat interface opens — this is OpenClaw's familiar interface. Type a task in natural language. Start simple: "Summarize the 5 most recent files in /sandbox and create a report." Watch the activity log on the right — you'll see each tool call the agent makes, and any network requests it tries to make (which will appear as approval prompts if they're not pre-approved).
/sandbox/.nemoclaw/audit.log as a JSON file you can export and review later.
sudo — use it intentionally.
nemoclaw skills list in the terminal or visit build.nvidia.com/nemoclaw.
nemoclaw audit show --since yesterday.
15 NemoClaw Secrets That Separate Beginners from Power Users
These tips were surfaced from developer forums, Discord threads, GitHub issues, and the NVIDIA developer community. Most NemoClaw users will never discover these on their own.
--non-interactivenemoclaw onboard command pauses for interactive confirmations. Add the --non-interactive flag to bypass all prompts and use default settings: nemoclaw onboard --non-interactive --blueprint v0.1.0. Combine with --policy /path/to/company-policy.json to deploy a pre-configured, standardized setup to every machine silently.nemoclaw onboard. Save your trusted domains to ~/.nemoclaw/network-allowlist.json in the format {"approved": ["api.github.com", "pypi.org", "npmjs.com"]}. NemoClaw reads this file on startup and pre-approves all listed domains so the first session is frictionless. Find the full schema in the NemoClaw docs at docs.nvidia.com/nemoclaw/latest/reference/.nemoclaw task to Queue Tasks Without the UInemoclaw task "Analyze all PDFs in /sandbox/reports and output a summary table". The task is queued immediately, runs in the background, and the output is written to /sandbox/.nemoclaw/task-results/. Pipe it into scripts, cron jobs, or other automation without ever opening a browser./sandbox and /tmp. But you can mount additional read-only directories from your host system into the sandbox using the config file at ~/.nemoclaw/config.yaml. Add a volume_mounts section: - host: /home/user/projects, sandbox: /sandbox/projects, mode: read-only. The agent gains visibility into your real files without ever having write access to them — perfect for code review or document analysis tasks.nemoclaw config set audit.verbose true. Warning: this significantly increases log volume — rotate logs daily using nemoclaw audit rotate --keep 30 to avoid disk bloat.NEMOCLAW_SKIP_RAM_CHECK=1 as an environment variable before running the installer. The agent will run — just slower. Combine with configuring k3s to use a memory limit via nemoclaw config set k3s.memory_limit 4Gi for best results.--dry-run Mode for Policy Testingnemoclaw policy test --policy my-policy.json --dry-run. This simulates a set of standard agent behaviors against your policy and reports which actions would be allowed, blocked, or prompted for approval — without actually running any agent. The test suite covers 40+ common agent actions including file writes, network calls, subprocess execution, and credential access patterns.http://localhost:3001/api/v1 (note: different port from the UI). You can POST tasks, GET task status, stream results, and query the audit log programmatically. This means any app — your own web app, a Python script, a VS Code extension — can interact with your secure agent via HTTP. Enable it with nemoclaw config set api.enabled true and generate an API token with nemoclaw api token create.~/.nemoclaw/agents.yaml with multiple agent definitions — each pointing to its own blueprint version and policy file. Use the handoff_to: directive to route subtasks from a coordinator agent to specialist agents. This is the foundation of a secure multi-agent system on a single machine.build.nvidia.com/nemoclaw platform hosts a growing catalog of verified agent skills — from database connectors to web scraper to API integrations — all pre-cleared for NemoClaw's security model. Each skill on the platform has been reviewed by NVIDIA and comes with a pre-defined permission manifest. Installing from the Build platform (nemoclaw skills install --source build.nvidia.com <skill-id>) is safer than installing community skills, which have no vetting./sandbox/.nemoclaw/system-prompt.md with persistent instructions — your name, your company, preferred output formats, recurring context. NemoClaw automatically injects this file as the system prompt for every session. Update it anytime: the change takes effect on the next session start without restarting the agent service.nemoclaw config set inference.allow_cloud false. This disables the Privacy Router entirely and forces all inference through your local Nemotron model regardless of task complexity. No cloud API calls are possible in this mode — the network policy is enforced at the kernel level via OpenShell, not just application-level.nemoclaw snapshot create my-snapshot saves the complete state of your agent — active policies, approved network list, installed skills, /sandbox contents, and audit log — to a compressed archive. Restore any time with nemoclaw snapshot restore my-snapshot. This is invaluable for testing dangerous tasks: snapshot first, experiment, then restore if something breaks. It's also perfect for reproducible demo environments./sandbox/.nemoclaw/pii-detections.log — including what type (email, phone, SSN, etc.), which task triggered it, and what it was replaced with before cloud routing. Run nemoclaw audit pii-report --since 7d to get a weekly summary. This log is critical for GDPR Article 25 (data protection by design) compliance documentation.nemoclaw config set community.contribute_usage true) that anonymizes and uploads non-sensitive usage telemetry — task patterns, skill performance, model routing decisions — to the OpenClaw community dataset. This improves the base OpenClaw models and earns you early access to new skills on the Build platform. All data is stripped of PII before transmission regardless of your PII masking settings, and you can review exactly what would be sent before enabling it with nemoclaw telemetry preview.Advanced Use Cases
Here are exactly how enterprise teams are using NemoClaw right now, with the specific policy configurations that make them possible.
🕵️
The Legal Analyst
For Law Firms & Compliance Teams
▶
Lawyers need AI to summarize thousands of pages of discovery documents, but uploading sensitive client data to cloud APIs is a disbarrable offense. NemoClaw solves this.
inference.allow_cloud = false, Network fully blocked, File read-only access to /network-drive/case-files.
👨💻
The Autonomous QA Engineer
For Dev Shops & SaaS Companies
▶
Running synthetic tests on staging environments usually requires exposing internal APIs or giving human testers broad access. NemoClaw acts as an automated, walled-off tester.
staging.company.internal, File access restricted to test logs directory. PII Masking ON.
📊
The Financial Data Scrubber
For Hedge Funds & Accounting
▶
Analysts spend hours cleaning messy financial CSVs before loading them into Pandas or Excel. NemoClaw automates the ETL pipeline securely.
Integrations & Ecosystem
Because NemoClaw is built on top of OpenClaw, it inherits the entire OpenClaw skill ecosystem — but enforces security boundaries on all of them.
Pricing Breakdown
NemoClaw's software is free. You only pay for the hardware you run it on, and any optional cloud inference you choose to route to.
- NemoClaw CLI & Dashboard (Free)
- Local Nemotron-8B or Llama-3 (Free)
- Existing RTX 3000/4000 GPU (Free)
- OpenClaw community skills (Free)
- Everything in Hobbyist
- Local Nemotron-3 120B Int4 (Free)
- Occasional GPT-4o / Claude 3.5 routing (~$45 in API costs)
- Privacy Router masking (Free)
- Dedicated RTX Ada generation machine
- Local-only inference routing ($0 API costs)
- NVIDIA AI Enterprise support (Optional)
- Full SOC2 / HIPAA compliance tooling
Current Limitations (v0.8.2-alpha)
NemoClaw is wildly powerful, but it's still an alpha preview. Before migrating production workloads, be aware of these constraints:
No macOS or Windows Native Support
NemoClaw relies heavily on Linux kernel features (cgroups, namespaces) for the OpenShell sandbox and nvidia-container-toolkit for GPU passthrough. You cannot run this natively on a M3 Mac or Windows. WSL2 support is "experimental and unsupported."
High VRAM Floor for Local Nemotron
While NemoClaw runs on 8GB VRAM cards using smaller models, its headline capabilities (complex reasoning, tool orchestration) require the Nemotron-3 120B model. Even highly quantized, this requires 24GB VRAM (an RTX 3090 or 4090). Without it, you must rely on cloud routing, which somewhat defeats the local-first ethos.
Brittle PII Masking on Unstructured Data
The Privacy Router is excellent at catching SSNs, credit cards, and standard API keys. It struggles with context-dependent confidential info ("Project Orion architecture docs") unless you write very specific custom Regex rules in the policy file.
Frequently Asked Questions
What's the difference between OpenClaw and NemoClaw? +
Do I need an NVIDIA GPU to use NemoClaw? +
Can an agent break out of the OpenShell sandbox? +
How much coding knowledge do I need? +
Is NemoClaw truly open source? +
Automate Your Workflows
With MyJarvis.
Discover exactly how our AI agents can radically improve efficiency and reduce operational costs. We help you identify high-impact automation opportunities tailored for your specific needs.
Take the next step in your automation journey. Book a free consultation to see how MyJarvis can transform your business.
Book Free Strategy CallWant help turning this guide into a working system?
Bring the workflow you want to automate and we will help identify the fastest useful build path.
Get the automation checklist
A simple checklist for spotting the first workflow worth automating.