


Clawdbot represents a fundamental shift in how we think about AI agents—from cloud-dependent services to sovereign, self-hosted systems that you truly own and control.
Clawdbot is a local-first AI agent that runs on your own machine—Mac, Linux server, NAS, or any hardware you control. Unlike cloud-based AI assistants, Clawdbot keeps your sensitive data where it belongs: on your infrastructure.
It's not just a chatbot; it's a complete agent runtime with memory, scheduled execution, and real action capabilities. Clawdbot can keep context over days and weeks, run morning briefings automatically, react to webhooks and events, and execute real operations with configurable safety rails.
Team9 makes deploying Clawdbot instant. No complex setup, no infrastructure headaches, no manual configuration of Node.js, messaging adapters, or security policies—just sovereign AI agents that work for your team, on your terms, deployed in minutes instead of days.
Whether you're automating daily reports, monitoring server health, managing your knowledge base, or orchestrating GitHub workflows, Clawdbot brings the power of AI agents to your infrastructure without sacrificing privacy or control.
Local Execution
Runs where you choose—your machine, your server, your network
Persistent Operation
Scheduled jobs, background daemons, event-driven triggers
Agency with Constraints
Real actions with safety rails and permission boundaries
Sensitive context stays local. No uploading private files, code, or credentials to opaque cloud systems.
Long-term memory stored as plain Markdown. Inspect, edit, or delete—you own your data.
Extend capabilities via MCP (Model Context Protocol). Add tools without forking the core.
The perfect storm of technology maturity, privacy concerns, and practical utility
Users increasingly want AI agent benefits without routinely uploading private files, internal code, calendars, or credentials into opaque cloud systems. Local-first execution addresses this anxiety directly, giving teams the confidence to use AI agents with their most sensitive data.
For years, voice assistants promised a digital assistant experience but lacked reliable action capabilities. When large language models gained tool use and planning patterns, a real action loop became practical. Clawdbot turned that possibility into reality.
A spare Mac mini, home server, or low-power Linux box can host an always-on agent. That physical anchoring creates a sense of ownership and continuity that cloud agents rarely provide. Your agent lives where you live—on your network, your schedule, your terms.
Developers can add capabilities by attaching tool servers rather than forking a monolith. The Model Context Protocol creates a smoother ecosystem curve while letting users keep control. This composability turned Clawdbot into a platform, not just a product.
Real-world automation that runs on your infrastructure
Morning updates, nightly checks, and automated reports delivered to your chat channels.
Proactive health checks and instant alerts when something needs attention.
Summarize files, update docs, and keep your team's knowledge organized.
Automate issue triage, PR reviews, and release workflows.
Clawdbot's architecture is modular and opinionated: Gateway handles communication, Runtime executes the plan-and-act loop, and Memory stores context transparently.
The Gateway is your agent's perimeter and communication interface. It connects to Telegram, WhatsApp, Discord, Signal, and other messaging platforms through adapters.
It handles session identity mapping, pairing policies (deny by default for unknown senders), and normalizes inbound messages before they reach the agent runtime. Think of it as the secure front door to your agent.
The runtime (typically Node.js v22+) executes a reasoning-and-action loop similar to ReAct patterns: generate a plan, call tools step-by-step, feed results back to the model, and continue until complete or hitting a guardrail.
Production deployments add per-tool permission scopes, human approval for risky actions (filesystem writes, shell execution), time and cost limits, and structured logs for auditability.
Clawdbot's "Markdown memory" design is both SEO-friendly and user-friendly. Long-term memory is stored in plain text files that you can inspect, edit, or delete directly.
Deletions are real and verifiable—no hidden databases or opaque storage. Retrieval can use embeddings layered on top without hiding the underlying state. This favors transparency and reversibility, crucial for sovereign agents.
A conservative baseline for Clawdbot deployment binds services to localhost by default and exposes remote access through an encrypted overlay network like Tailscale or a similar mesh VPN.
This approach reduces attack surface, avoids complex router port forwarding, and still allows global access to your agent from your phone or laptop. Public ports for chat gateways and tool servers are generally discouraged unless you have strong authentication and rate limiting in place.
Get Clawdbot running on macOS, Linux, or WSL2 in minutes
Most common path. Uses launchd for background execution.
Production-ready deployment with security hardening.
Recommended for Windows users via Ubuntu 24.04 LTS.
⚠️Keep project inside Linux filesystem, not mounted Windows paths
Extend Clawdbot with custom workflows and scheduled operations
Community-built capabilities for common workflows: web search, GitHub operations, note apps, ticketing systems, smart home integration, and more.
Convert your agent from reactive to proactive with cron-style schedules. Run tasks automatically without manual intervention.
Define workflows in structured natural language using SKILL.md format. Describe inputs, outputs, and guardrails in plain text—no complex coding required.
Agent systems expand attack surface—here's how to stay safe
Untrusted text (webpages, docs, messages) can manipulate agent behavior.
Community skills and plugins introduce supply chain risk.
Publicly exposed gateways invite unauthorized access.
Everything you need to know about Clawdbot
Daily briefings, automated reporting to chat channels, server monitoring alerts, file and note summarization, and tool-driven workflows (GitHub ops, knowledge base updates)—all running on your own machine.
No. A Mac mini is convenient for always-on hosting, but any machine you control can run Clawdbot—Mac, Linux server, NAS, or even a laptop. Availability matters more than the hardware brand.
Yes, if you attach a local model runtime (e.g., Ollama). Some skills still require internet access (webhooks, remote APIs), but the core agent loop can be fully local.
Safety depends on deployment. A secure setup includes pairing policies, limited tool permissions, sandboxed filesystem access, approval gates for risky actions, and private network exposure through a mesh VPN. Team9 provides sensible defaults.
MCP (Model Context Protocol) is a way to attach external tool servers to the agent so it can access services and capabilities in a composable way. Treat MCP servers as privileged code and use allowlists and minimal permissions.
The stable route is WSL2 (Windows Subsystem for Linux) with a modern Ubuntu distribution (24.04 LTS recommended). Run all setup steps inside WSL2 and keep the project inside the Linux filesystem—avoid mounted Windows paths to prevent file locking and permission issues.
Clawdbot is the rebranded successor to Clawdbot. The project was renamed to avoid trademark conflicts while maintaining the same core functionality and community. "Molt" refers to crustaceans shedding their shell to grow—symbolizing growth beyond constraints while keeping the lobster mascot and culture intact.
Yes. You can attach local model runtimes like Ollama for completely offline operation. This is ideal for privacy-sensitive workflows or air-gapped environments. Note that some skills may still require internet access for external APIs, but the core agent loop can run entirely local.
Team9 eliminates the complexity of manual setup. Instead of configuring Node.js, managing dependencies, setting up messaging adapters, and hardening security yourself, Team9 provides instant deployment with sensible defaults. You get a production-ready Clawdbot agent with zero infrastructure headaches.
How Clawdbot compares to AutoGPT, LangChain agents, and cloud-based alternatives
Philosophy: Local execution, transparent memory, explicit permission boundaries. Runs on hardware you control.
Best for: Teams that prioritize data sovereignty, need persistent operation (cron jobs, event triggers), and want full control over the execution environment.
Trade-offs: Requires hosting infrastructure (Mac, Linux, VPS). Initial setup complexity reduced by Team9.
Philosophy: Autonomous loops that break down goals into steps and execute until complete. Focus on self-direction.
Best for: Research tasks, content generation, exploratory workflows where supervision isn't critical.
Trade-offs: Can spiral into expensive loops without strict guardrails. Less emphasis on persistent operation and chat integration.
Philosophy: Flexible building blocks for custom agent workflows. Library-first approach.
Best for: Developers building custom applications who need fine control over agent architecture and tool chains.
Trade-offs: Requires significant coding. Not an out-of-the-box agent runtime—you build your own on top of the framework.
Philosophy: Turnkey convenience. Zero infrastructure management. Browser or app-based access.
Best for: Individual users or teams comfortable uploading data to third-party services in exchange for ease of use.
Trade-offs: Data leaves your control. Limited customization. No persistent local operation or scheduled workflows on your infrastructure.
Clawdbot sits at the intersection of sovereignty, practicality, and ecosystem maturity. It's not just a framework (like LangChain) or a research experiment (like early AutoGPT)—it's a production-ready agent runtime that integrates with your daily tools (chat apps, GitHub, calendars) while keeping data local and operations transparent. With Team9, you get Clawdbot's power without the infrastructure burden.
Join teams that value control, privacy, and instant deployment.