惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
G
GRAHAM CLULEY
P
Privacy & Cybersecurity Law Blog
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
宝玉的分享
宝玉的分享
P
Proofpoint News Feed
H
Help Net Security
V
Visual Studio Blog
阮一峰的网络日志
阮一峰的网络日志
C
Cisco Blogs
人人都是产品经理
人人都是产品经理
Know Your Adversary
Know Your Adversary
freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More
Recorded Future
Recorded Future
I
Intezer
罗磊的独立博客
T
The Exploit Database - CXSecurity.com
Blog — PlanetScale
Blog — PlanetScale
Malwarebytes
Malwarebytes
Spread Privacy
Spread Privacy
T
Tor Project blog
V
Vulnerabilities – Threatpost
云风的 BLOG
云风的 BLOG
腾讯CDC
B
Blog RSS Feed
Stack Overflow Blog
Stack Overflow Blog
F
Future of Privacy Forum
MyScale Blog
MyScale Blog
Latest news
Latest news
IT之家
IT之家
MongoDB | Blog
MongoDB | Blog
The Hacker News
The Hacker News
S
Securelist
博客园 - 【当耐特】
C
CXSECURITY Database RSS Feed - CXSecurity.com
T
Threat Research - Cisco Blogs
Jina AI
Jina AI
Cisco Talos Blog
Cisco Talos Blog
B
Blog
博客园 - 三生石上(FineUI控件)
Last Week in AI
Last Week in AI
CTFtime.org: upcoming CTF events
CTFtime.org: upcoming CTF events
M
MIT News - Artificial intelligence
V
V2EX
D
Darknet – Hacking Tools, Hacker News & Cyber Security
The Cloudflare Blog
The GitHub Blog
The GitHub Blog
博客园 - 聂微东
F
Full Disclosure
C
CERT Recently Published Vulnerability Notes

Hacker News - Newest: "OpenClaw"

Pi creator removed from OpenClaw's GitHub organization Use Grok in OpenClaw The creator of OpenClaw used $1,300,000+ of OpenAI tokens in 30 days, which is a hell of a perk 3months ago, I predicted OpenClaw wouldn't uninstall cleanly and prepared for it Reducing OpenClaw token usage Where OpenClaw Security Is Heading — OpenClaw Blog How AI agent harnesses like OpenClaw are changing LLMs, inference, and CPUs Show HN: OpenClaw is just not dangerous enough. I needed something else OpenClaw creator burned through $1.3 million in OpenAI API tokens in a single month — bill covered 603 billion tokens across 7.6 million requests and 100 coding agents Compared a few OpenClaw hosting setups Private Hosted OpenClaw that can connect to your data with included AI models GitHub - ExTV/rikkahub-agent: RikkaHub Agent -- is RikkaHub fork that have Full agent mode . twitter.com For $1.3 million a month, OpenClaw founder Peter Steinberger runs 100 AI agents that code, review PRs, and find bugs ClawHub OpenAI Models in OpenClaw, Done Right — OpenClaw Blog GitHub - thesysdev/openclaw-os: The default workspace for OpenClaw Supafax | Email, done for you LLM Rankings | OpenRouter Token, Harness, OpenClaw, RAG, MCP, Agent – What's the Difference? We need a safe alternative to Telegram for agents like OpenClaw or Hermes Agent Watch — pick stable OpenClaw & Hermes Agent releases Two OpenClaw agents negotiate a YC SAFE with Agentic Power of Attorney Google is building an AI agent that could be its answer to OpenClaw Brit mathematician lets AI agent loose with credit card – cue password leaks, CAPTCHA chaos and more OpenClaw Had a Rough Week — OpenClaw Blog CARAPACE — Your OpenClaw has eyes. GitHub - LobsterTrap/tank-os Running OpenClaw on Amazon EC2 with Claude and Telegram GitHub - haishmg/Clawback How OpenClaw Got Safer in Public — OpenClaw Blog twitter.com Sandboxes Won’t Save You From OpenClaw – Endo Why everyone is quietly quitting OpenClaw [video] openclaw ggsql — ClawHub Show HN: iClaw is part OpenClaw, part Siri, powered by Apple Intelligence GitHub - lotsoftick/openclaw_client: OpenClaw web client Show HN: OpenClaw but Efficient and with an SDK Agentbot | Focus on the Work. Agents Handle the Rest. Blog - Agentbot Shipping Log The receipt, warranty, and purchase tracker for people who work for themselves OpenClaw vs. Hermes Agent: The race to build AI assistants that never forget GitHub - TheGuyWithoutH/mac-computer-use GitHub - microsoft/openclaw: Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞 The OpenClaw turkey problem OpenClaw: opioids for Chinese AI companies GitHub - supersuit-tech/permission-slip [AINews] The Two Sides of OpenClaw OpenClaw stats don't add up GitHub - brexhq/CrabTrap: An LLM-as-a-judge HTTP proxy to secure agents in production Anthropic - OpenClaw twitter.com Hustlers are cashing in on China’s OpenClaw AI craze Build an OpenClaw Free (Secure), Always-On Local AI Agent I Created OpenClaw – Peter Steinberger, TedTalk, YT) Blog nilbox — The Safe Way to Run OpenClaw Engineering Managers are going to hate OpenClaw GitHub - opentalon/opentalon: OpenTalon is an open-source platform built from the ground up in Go as a robust alternative to OpenClaw Eustella: We reinvent ChatGPT for Europeans, with OpenClaw in mind Ask HN: Who is using OpenClaw? Stopping the Meta AI director's "OpenClaw failure with an out-of-band killswitch Deploy OpenClaw on AWS: Choose the right options for your AI workload Show HN: Make sure your OpenClaw isn't doing things it's not supposed to Show HN: Visualizing OpenClaw runs to debug flaws and token spikes RedCrab — Your Own AI Cloud Instance with Unlimited Tokens Open Source Deploy for OpenClaw — AutoClaw Ask HN: What are you using OpenClaw or agents for? GitHub - epsilla-cloud/clawtrace: Make your OpenClaw agents better, cheaper, and faster. OpenClaw Self-Improvement Loop: adversarial agentic self-modification workflow ClearFrame – Secure Auditable Alternative to OpenClaw Show HN: Agent-Notifications – Real-Time Alerts for OpenClaw and Hermes Agents Can OpenClaw and Claude be better than therapy? GitHub - zeulewan/glueclaw: Use Claude Max subscription with OpenClaw again Anthropic temporarily banned OpenClaw’s creator from accessing Claude OpenClaw’s memory is unreliable, and you don’t know when it will break Eve EkyBot — Your AI team on your machine ClawNetwork — The Blockchain Built for OpenClaw We let OpenClaw loose on an internal network. Here’s what it found Give Your OpenClaw Agent a Real Memory You need a Windows Remote Desktop, not an OpenClaw GitHub - cruxdigital-llc/CongaLine: Deploy and manage a fleet of OpenClaw AI assistants anywhere. Supporting hobbyist, team, and enterprise use cases. GitHub - cezarpena/vsm-cell: VSM-Cell is an OpenClaw agent P2P mesh orchestration standalone app. GitHub - joshchoi4881/dropspace-agents GitHub - askalf/dario: Universal LLM router. One local endpoint, every provider — OpenAI, Groq, OpenRouter, Ollama, Claude Max/Pro subscriptions, the Claude Agent SDK, any OpenAI-compat URL. Your tools stop caring which vendor is upstream. Tutorial: Secure OpenClaw with CloudConnexa OpenClaw and the Dream of Free Labour GitHub - RageDotNet/openclaw-webdav GitHub - kevinslin/openai-apps: Support openai apps in openclaw twitter.com GitHub - aelaguiz/doctrine: Code-like DSL and compiler for agent workflows that compile to portable AGENTS.md instructions. Unlocking cloud inference compute for OpenClaw
Setup OpenClaw with Slack: from install to first message
nirnejak · 2026-05-21 · via Hacker News - Newest: "OpenClaw"
← Back to blog

[ Blog ]

May 20, 2026·Jeet

OpenClaw is one of the friendliest ways to get a self-hosted AI assistant wired into the tools you already use, but only once you know the steps that quietly fail if you skip them. Getting it running end to end, installed, connected to Slack, and staying alive, takes more steps than the scattered docs make obvious, and a few of them fail silently if you miss them.

This is a practical OpenClaw setup walkthrough, written from actually doing it. No theory, no pitch. Pick your machine, install, connect Slack, done.

So what is OpenClaw, really?

OpenClaw is a self-hosted AI agent gateway. You run one Gateway process on a machine you control. That process routes messages, manages sessions, talks to your model provider, and connects to whatever chat surface you want, Slack, Telegram, Discord, and so on.

The mental model that helped me: you are not installing a chatbot. You are standing up a small piece of infrastructure. Once that clicks, the rest of the OpenClaw setup makes more sense.

Prerequisites

Two things before you touch anything:

  • An API key from a model provider (Anthropic, OpenAI, or Google).
  • A machine to run it on. The next step covers your options.

You also need Node.js 22 or newer, but depending on the machine you pick, that may already be handled.

Step 1: Choose your machine

The Gateway has to live somewhere, and that choice shapes the rest of the OpenClaw setup. Four reasonable options:

Mac mini at home. Reliable, fast, cheap to run. Con: it is a dedicated device that has to stay on, and exposing it to anything outside your network needs more work.

Your laptop. Fine for testing. Con: the Gateway dies when you close the lid, and the agent runs shell commands on the same machine you actually use.

A VPS (DigitalOcean, Hetzner, etc). Always on, isolated from your laptop. Con: you handle the OS install, Node, firewall, persistence, and DNS yourself.

A Superserve sandbox. Cloud sandbox with snapshotting, isolated by default. The superserve/openclaw template ships with OpenClaw and tmux pre-installed, so the install steps go away. Con: depends on a managed service, which is a tradeoff vs running your own box.

Full disclosure, we're biased, but we genuinely think a Superserve sandbox is the easiest and most effective way to run OpenClaw, especially if you want more than one. The install is short, isolation is sensible for an agent that runs shell commands, and snapshots make it cheap to experiment. That is what the rest of this guide assumes. The Slack and config steps are identical anywhere else, just install Node, OpenClaw, and tmux yourself first.

Create a Superserve sandbox

  1. Go to console.superserve.ai and click Create sandbox.
  2. Pick the superserve/openclaw template. It comes with Node, OpenClaw, and tmux already installed.
  3. Open Advanced Options and add your model provider key under Environment Variables, for example ANTHROPIC_API_KEY. You will add the Slack tokens here too once you have them.
  4. Create the sandbox and open its Terminal.

Confirm OpenClaw is on PATH:

bash

openclaw  --version

Step 2: Run the onboarding wizard

openclaw onboard is the main entry point for OpenClaw setup. It walks you through the Gateway, the workspace, and your model provider.

bash

openclaw onboard

OpenClaw onboard output in the Superserve console

OpenClaw onboard output in the Superserve console

You can skip the hooks and most optional steps for now and configure them later. Get the core running first; everything else is easier once messages are flowing.

When it finishes, sanity check that your provider is wired up:

bash

openclaw models list

If the list is empty, your API key is wrong or billing is not set up. Fix that before going further, because nothing downstream will work without a model.

Step 3: Set up the Slack gateway

This is where most people get stuck, Slack has a lot of small switches that all have to be on. You need an app, two tokens, the right scopes, and event subscriptions. Miss one and the bot stays silent with no obvious error.

Create the Slack app

  1. Go to api.slack.com/apps and create a new app from scratch.
  2. Name it (I used OpenClaw) and pick your workspace.

Enable Socket Mode

Socket Mode is the right choice for most OpenClaw setups. It uses an outbound WebSocket, so you do not need a public URL or any inbound firewall rules. This matters especially on a sandbox or home machine, where you cannot easily expose ports.

  1. In the app settings, go to Socket Mode and toggle it on.
  2. Go to Basic Information, then App-Level Tokens, and generate a token with the connections:write scope. This is your xapp- token. Save it.

Add bot scopes

Go to OAuth & Permissions, then Bot Token Scopes. Add at minimum:

text

app_mentions:read
channels:history
channels:read
chat:write
groups:history
groups:read
im:history
im:read
im:write
mpim:history

If you want the bot to send or receive file attachments, also add files:read and files:write.

Subscribe to events

This step is easy to miss and it is the most common reason a freshly configured bot does nothing. Socket Mode connects fine without it, but if Slack does not know which events to send, nothing flows through.

  1. Go to Event Subscriptions and toggle Enable Events on.
  2. Under Subscribe to bot events, add:

text

app_mention
message.channels
message.groups
message.im
message.mpim

  1. Save changes.

Install and grab the bot token

Install the app to your workspace. Copy the xoxb- Bot User OAuth Token from OAuth & Permissions.

Important: any time you change scopes or events after this, Slack requires a reinstall, and the reinstall generates a new xoxb- token. Old token, old scopes. If you see missing_scope errors later, the reinstall did not take, or you are still using the old token.

Store tokens as environment variables

Slack needs two tokens, and you should not paste either of them directly into the config file. Use environment variables and reference them from the config. The two are:

  • SLACK_BOT_TOKEN, the xoxb- bot token from OAuth & Permissions
  • SLACK_APP_TOKEN, the xapp- app-level token from Basic Information

On a Superserve sandbox, add both under Environment Variables in the console, alongside your model key. Set there, they are injected into the sandbox environment itself, so every new shell and every process started in the sandbox sees them. This matters more than it sounds, see the note on the running Gateway below.

On any other machine, persist them in your shell profile:

bash

echo 'export SLACK_BOT_TOKEN=xoxb-your-token' >> ~/.bashrc
echo 'export SLACK_APP_TOKEN=xapp-your-token' >> ~/.bashrc
source ~/.bashrc

Configure the Slack channel in OpenClaw

The config lives in ~/.openclaw/openclaw.json. The cleanest way to edit it is the openclaw config patch command, which validates against the schema instead of letting you break the JSON by hand. A blind hand-edit is a fast way to get cryptic validation errors.

The shape of the Slack config block can shift between versions, so treat the example below as a starting point and always run config patch --dry-run first to confirm what your version expects. This is the block that passed validation for me:

json

"slack": {
  "enabled": true,
  "mode": "socket",
  "webhookPath": "/slack/events",
  "userTokenReadOnly": true,
  "botToken": { "source": "env", "provider": "default", "id": "SLACK_BOT_TOKEN" },
  "appToken": { "source": "env", "provider": "default", "id": "SLACK_APP_TOKEN" },
  "groupPolicy": "allowlist",
  "channels": {
    "C0XXXXXXXXX": { "requireMention": true }
  }
}

A few things that tripped me up here:

  • mode, webhookPath, and userTokenReadOnly are required by the schema. If you patch a Slack block without them, config patch rejects it with must have required property errors. webhookPath is not actually used in Socket Mode, but the schema still wants it present, so give it a value like /slack/events and move on.
  • The botToken and appToken use the SecretRef format { "source": "env", ... } so the tokens are read from environment variables, not stored in the file. Both tokens are needed: SLACK_BOT_TOKEN (the xoxb- bot token) and SLACK_APP_TOKEN (the xapp- app-level token). Socket Mode will not connect if either one is missing or unresolved.
  • Use the channel ID, not the name. Name-based keys silently fail to route. Get the ID by right-clicking the channel in Slack and copying the link. The ID is the C... value at the end.
  • The channel ID as a key is itself the allow. There is no allow: true property to add inside it. Adding one fails schema validation.
  • With groupPolicy: "allowlist", the bot only responds in the channels you list. If you skip the next part, doctor warns that group messages are being silently dropped. To let anyone in the channel use the bot, you need to allow senders. Note that doctor and the schema disagreed here in the version I used: doctor suggested adding senders to groupAllowFrom, but config patch rejected groupAllowFrom as an unknown property. Run config patch --dry-run to find the field name your version actually accepts before relying on it.
  • requireMention: true means people have to @ the bot to trigger it. Without this the bot replies to every message in the channel, which gets old fast.

Set yourself as command owner

By default no one can run owner-only commands like /diagnostics or /config. Set your Slack user ID as the owner:

bash

openclaw config set commands.ownerAllowFrom '["slack:U0XXXXXXXXX"]'

Get your user ID from your Slack profile, three-dot menu, Copy member ID.

Step 4: Run doctor

openclaw doctor checks your config for common mistakes and risky policies. Run it before you start the gateway.

bash

openclaw doctor

It will flag things like empty sender allowlists, contradictory reply settings, a missing command owner, and the gateway not running. Fix what it flags before moving on, doctor is your best friend here. It is also the first thing to run any time the bot starts acting strange later, and it catches most misconfigurations on its own.

On a sandbox or any machine without systemd, doctor will also note that user services are unavailable and tell you to run the Gateway in the foreground. That is expected. The next step handles it.

Step 5: Start the gateway in tmux

The Gateway has to run in the foreground on any machine without a systemd user service, which includes sandboxes and most containers. Foreground means it dies when you close the terminal, so run it inside tmux:

bash

tmux new -s openclaw
openclaw gateway run

Watch the logs. You want to see socket mode connected and a line resolving your channel by ID. Then detach without killing the Gateway: press Ctrl+B, release, then press D. You are back at a normal shell and the Gateway keeps running.

To check on it or come back later:

bash

tmux ls                    # list sessions
tmux attach -t openclaw    # reattach

One subtlety: you cannot move an already-running foreground process into tmux after the fact. If you started the Gateway directly in the terminal, you have to Ctrl+C it first, then start it fresh inside tmux. A few seconds of downtime.

Step 6: Test in Slack

In Slack:

  1. Invite the bot to the channel: /invite @OpenClaw
  2. Mention it: @OpenClaw hello

If it responds, your OpenClaw setup is working. On first run the bot may ask you to do an identity bootstrap. Do that in a DM, not the channel. DMs are gated by pairing, so the bot sends a one-time code and you approve it from the terminal:

bash

openclaw pairing list slack
openclaw pairing approve slack <code>

A few gotchas worth knowing

Env vars and the running Gateway. A process only sees environment variables that existed when its shell started. The Gateway runs inside a tmux session, and that tmux shell captured its environment when you created it. If you add or change a token after that, the already-running Gateway, and even the existing tmux shell, will not see the new value. After any token change, run source ~/.bashrc inside the tmux session (or rely on console-level env vars on a sandbox), then restart the Gateway with Ctrl+C and openclaw gateway run.

EAI_AGAIN against slack.com. This is a DNS resolution failure. It can happen when a long-lived process resumes before the network stack has fully settled, or when the host's DNS config is empty. Restart the Gateway first since DNS often resolves on retry. If it persists, check /etc/resolv.conf has a working nameserver, and confirm the host has outbound access to slack.com and Slack's WebSocket endpoints.

Startup optimization. Doctor suggests these on small hosts. Worth setting on a sandbox since it restarts often:

bash

export NODE_COMPILE_CACHE=/var/tmp/openclaw-compile-cache
export OPENCLAW_NO_RESPAWN=1
mkdir -p /var/tmp/openclaw-compile-cache

Wrapping up

That is a full OpenClaw setup, from picking a machine through a working Slack channel and a Gateway running in tmux. The pattern across every problem I hit was the same: a silent failure with no error in the channel, and the real cause buried in scopes, event subscriptions, or process lifecycle.

Run openclaw doctor whenever something acts strange. It catches most of it. And remember: a running Gateway only sees the environment it started with. Restart it after any token change and save yourself an hour of confusion.

For a quick OpenClaw on Superserve setup, check out our OpenClaw integration doc.