OpenClaw Operations Guide
Searchable reference for setup, identity tuning, skills, integrations, server operations and troubleshooting.
First-time setup
Create your first deployment safely and verify that gateway + agent are healthy before real traffic.
- Open Setup and choose provider, region, server size, AI model, and primary channel.
- Run Test Connection before deployment and confirm it returns success.
- Submit deployment and wait until status becomes active.
- Open Dashboard and confirm Agent = Online and Gateway Reachability = Online.
- Open Gateway and verify the health endpoint responds with JSON status.
- Run Diagnostics once and keep output for baseline comparison.
Customize identity and personality
Define agent behavior clearly so responses stay consistent and aligned with your use case.
- Set agent name, role, and interaction style in setup fields.
- Open File Browser and review workspace files: identity.md, soul.md, memory.md, and AGENTS.md/agents.md.
- Add hard constraints (allowed actions, prohibited actions, escalation rules).
- Save changes, then run a short validation chat to confirm tone + boundaries.
- Review weekly and refine based on real user conversations.
Enable and preconfigure skills
Enable only required skills and configure each with least-privilege access.
- Turn on only the skills your workflow needs (start minimal).
- Use Configure to set required env fields per skill.
- Prefer OAuth over long-lived secrets whenever provider supports it.
- Use folder/file allowlists for browser and drive integrations.
- Test each skill with one safe command before production use.
- Disable unused skills to reduce attack surface.
Telegram and account linking
Connect Telegram securely and approve trusted peers before enabling broad access.
- Create bot with BotFather and keep bot token private.
- Apply Channel Security Baseline from dashboard.
- Refresh Pairing Requests and approve only known owner/team IDs.
- Keep mention-required enabled for group chats.
- Use Refresh Channel Audit to confirm pairing and policy changes were recorded.
File Browser and editor usage
Use the file browser for controlled edits without SSH and validate changes immediately.
- Open File Browser and select the target file from workspace tree.
- For Markdown, switch between Raw and Markdown View to verify formatting.
- Use Edit > Save for changes; backups are retained by Time Machine.
- Use Fullscreen when editing long files to avoid UI overlap.
- After sensitive changes, run diagnostics and verify channel behavior.
Server management from dashboard
Recover common runtime problems directly from dashboard actions.
- Open Server Management and start with Run Diagnostics to collect current health details.
- If multiple services are failing, use Restart Services once and wait for statuses to refresh.
- If gateway URLs fail, run Reconcile Tunnel Bindings to repair tunnel-to-service mapping.
- Use Refresh Raw Logs immediately after each action and read newest errors first.
- For single-service issues, use service-specific Start/Stop/Restart controls only for that service.
- After recovery, run Maintenance to clean temporary state and stabilize runtime dependencies.
- Confirm health from Dashboard: Agent = Online and Gateway Reachability = Online.
- If issue persists, export logs/audit and share with support for deep triage.
SSH key + Web SSH terminal (step-by-step)
Manage public SSH keys from dashboard and use the browser terminal end-to-end through VPC tunnel.
- Deploy normally even if you do not have an SSH public key yet.
- Open Dashboard โ Server Management โ SSH Access (User-managed key).
- Paste a valid public key (ssh-ed25519 / ssh-rsa / ecdsa) and click Install Key.
- Confirm status message shows key was saved (and installed immediately if deployment is active).
- Use the Connect command shown by dashboard when you want native SSH from your local terminal.
- Use Web SSH Terminal in the same panel for in-browser shell access (no local SSH client required).
- If terminal disconnects, wait for auto-reconnect or click Reconnect.
- If gateway/terminal path fails, run Reconcile Tunnel Bindings, then retry Web SSH.
- Use Remove Key when rotating or revoking local machine access.
MiniMax integration and OAuth
Use OAuth when available and verify session linkage to current deployment.
- Select MiniMax provider during setup or update deployment configuration.
- Use Start MiniMax OAuth and complete provider consent flow.
- Run Refresh OAuth Status and verify connected for this deployment.
- Run Test Connection and confirm model response.
- Disconnect and re-link if token scope/account is incorrect.
Security best practices
Keep score high by closing critical findings first and enforcing strong channel controls.
- Refresh Security Posture and review score, grade, and open findings.
- Fix all critical/high findings before adding new integrations.
- Rotate API keys regularly and revoke unused credentials.
- Rotate SSH keys regularly: remove stale keys from dashboard and re-install only active workstation keys.
- Use short Web SSH sessions and reconnect on demand instead of keeping long idle sessions open.
- Run Hardening Assistant after major configuration updates.
- Keep pairing + mention guard enabled for production channels.
Advanced features
Use advanced operations for scale, traceability, and controlled rollout.
- Open Layout Studio and keep only sections needed for daily operations (remove visual noise).
- Reorder critical panels first: Channels, Security, Logs, and Server Management.
- Use panel width controls to give Logs/File Browser more space than low-frequency panels.
- Before changing identity, policies, or skills, create/verify Time Machine backup availability.
- Use Session Audit and Channel Audit after every security/policy update to validate changes.
- Export JSON/CSV audit snapshots weekly for compliance and incident readiness.
- Use Full Screen panel mode for long log reading, large file edits, and forensic reviews.
- After advanced changes, run Diagnostics + Security Posture refresh and confirm score trend improves.
Troubleshooting
Follow a stable runbook to isolate auth, gateway, service, and model failures quickly.
- Check Agent/Gateway status in dashboard summary first.
- Run Diagnostics and record outputs before making changes.
- If gateway is unreachable, run Reconcile Tunnel Bindings then retry.
- Refresh logs and locate first error timestamp, then correlate with recent config edits.
- Validate provider auth (OAuth session or API key), then test model connection.
- If still failing, export audits/logs and share with support for deep triage.
Quick Reference
Changelog
- Added MiniMax provider support with OAuth flow and test connection support.
- Added live activity polling and non-blocking dashboard refresh behavior.
- Added markdown render mode and full-screen file browser panel support.
- Added server management and security utility sections in dashboard.
- Added step-by-step SSH key workflow and in-dashboard Web SSH terminal guidance.
Was this guide helpful?
Feedback helps prioritize future OpenClaw improvements.