Loading...
Loading...
Security-focused OpenClaw rewrite in Rust by NEAR AI. All tools sandboxed in isolated WebAssembly environments. Built for private key protection. Zero unsafe code. Formal verification of core logic.
Install the Rust toolchain using rustup.
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
source ~/.cargo/envClone and compile IronClaw in release mode. This may take a few minutes on lower-powered devices.
git clone https://github.com/nearai/ironclaw.git
cd ironclaw
cargo build --releaseConfigure environment variables and run the compiled binary.
cp .env.example .env
# Edit .env with your settings
./target/release/ironclawTime from process start to first response
Average response time after startup
WASM sandbox on Xeon D. Server-grade security.
Run OpenClaw in a Docker container to keep it isolated from NAS services.
Allocate a dedicated CPU core and memory limit to prevent NAS performance impact.
Use the NAS storage for persistent data and backups.