Loading...
Loading...
Security-focused OpenClaw rewrite in Rust by NEAR AI. All tools sandboxed in isolated WebAssembly environments. Built for private key protection. Zero unsafe code. Formal verification of core logic.
Install the Rust toolchain using rustup.
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
source ~/.cargo/envClone and compile IronClaw in release mode. This may take a few minutes on lower-powered devices.
git clone https://github.com/nearai/ironclaw.git
cd ironclaw
cargo build --releaseConfigure environment variables and run the compiled binary.
cp .env.example .env
# Edit .env with your settings
./target/release/ironclawTime from process start to first response
Average response time after startup
WASM sandbox works. Cloud vCPU performance varies.
Use a reverse proxy like Caddy or nginx for HTTPS termination.
Set up monitoring with tools like htop, Prometheus, or Grafana.
Use cloud provider snapshots for easy backup and recovery.
Consider spot/preemptible instances for cost savings on non-critical deployments.