Onboarding Flow
When you run nemoclaw onboard, the system executes a sequential creation process that provisions a fully secured agent environment. Click each step below to see details.
Sandbox Creation Pipeline
Inference Routing
Every model API call from the agent is intercepted and routed through the privacy routerOpenShell component that routes inference requests to local or cloud models based on operator-defined policies, not agent preferences.. The agent never communicates directly with inference providers.
- Agent constructs an inference request (prompt + context) inside the sandbox
- NemoClaw plugin's registered inference provider intercepts the call
- Request is forwarded to the OpenShell gateway (outside the sandbox)
- Privacy router evaluates the request against configured policies
- Request routes to a local model (Nemotron via Ollama) or cloud endpoint (NVIDIA Endpoints, OpenAI, Anthropic, Gemini)
- Provider credentials are injected at the gateway -- the agent never sees API keys
- Response flows back through the gateway into the sandbox
nvidia/nemotron-3-super-120b-a12b via NVIDIA Cloud API.Network Policy Enforcement
NemoClaw uses a deny-by-default network model. All outbound connections are blocked unless explicitly allowed in the YAML policy file.
When the agent attempts to reach a blocked endpoint:
- OpenShell intercepts the connection at the network namespace boundary
- The connection is blocked and logged
- The blocked request surfaces in the operator's terminal UI (
openshell term) - The operator can approve the endpoint for the current session
- Session approvals persist until sandbox restart but do not modify baseline policy
Filesystem & Process Isolation
Filesystem (Landlock)
The sandbox filesystem access is enforced by the Landlock Linux Security Module:
- Read-write:
/sandbox(agent working directory) and/tmp(temporary files) - Read-only: System paths (
/usr,/lib,/etc) - No access: Everything else -- host filesystem, other containers, credential stores
Process (seccomp)
The seccomp filter profile drops dangerous system calls and prevents privilege escalation. The agent cannot use setuid/setgid, and operations like ptrace, mount, and reboot are blocked. The container runs as a non-root user with Docker capabilities dropped to the minimum set.
State Management & Migration
NemoClaw supports migrating agent state between machines (e.g., moving from a dev laptop to a production GPU server). The migration process creates a snapshot, strips all credentials, exports as a portable artifact, then re-provisions on the target machine with local credentials. Credential stripping prevents accidental API key exposure when sharing states across environments.