Skip to main content

Command Palette

Search for a command to run...

nemoclaw helps. the real enterprise problem remains

one agent got safer. shared gateways not so much

Updated
3 min read
nemoclaw helps. the real enterprise problem remains

Original article: nemoclaw helps. the real enterprise problem remains by OpenClaw Unboxed — published 2026-03-19


Summary

Main Thesis

NVIDIA's NemoClaw plugin gives OpenClaw a meaningful runtime containment layer, but it does not solve OpenClaw's hardest enterprise challenge: hostile multi-tenancy on a shared gateway. These are different problems requiring different tools — NemoClaw hardens one runtime, while OCTW (OpenClaw Tenant Wrapper) isolates tenants from each other.

Key Findings

The Three Layers Are Distinct:

  • OpenClaw = agent platform
  • NemoClaw = runtime containment (network policy, filesystem limits, inference routing)
  • OCTW = tenant isolation (one gateway per tenant, container/network/filesystem isolation)

NemoClaw's Real Controls:

  • Strict-by-default network policy: only allowlisted endpoints reachable, unknown outbound intercepted for approval
  • Filesystem: /sandbox and /tmp writable, major system paths read-only
  • Process isolation: seccomp, network namespaces, and landlock
  • Inference routing: model calls go through OpenShell, not direct sandbox egress

Honest Caveats:

  • NemoClaw is currently alpha software — not production-ready per NVIDIA's own docs
  • Requires a fresh OpenClaw installation (deployment story still maturing)
  • Landlock enforcement is explicitly documented as best-effort
  • Default allowlist still includes GitHub, npm, Telegram, NVIDIA endpoints — supply-chain risk remains
  • No public third-party audit or formal verification package found

Persistent Prompt Injection Survives the Sandbox: Malicious instructions don't need to be in model weights — they can live in bootstrap files that get injected into context on every turn. NemoClaw reduces blast radius, not existence, of prompt injection.

OpenClaw vs NemoClaw on Public Security Maturity:

  • NemoClaw: stronger default runtime containment
  • OpenClaw: stronger public security paper trail (security guide, multiple-gateway guidance, MITRE ATLAS threat model, formal verification page with explicit caveats, security audit CLI with --fix)

Practical Takeaways

Deployment Decision Guide:

ScenarioRecommendation
Solo devOpenClaw + sandbox, minimal plugins, tight allowlist
Small trusted teamOpenClaw + per-project isolation, strict plugin discipline
Multi-tenant SaaSNever share gateway — one gateway per tenant via OCTW
High-risk workloadsAdd NemoClaw inside each tenant boundary, restrict egress aggressively

Minimum Checklist:

  • Don't share gateways across untrusted users
  • Restrict network egress hard
  • Pin dependencies and versions
  • Treat plugins as code execution risk
  • Isolate memory and credentials per trust boundary
  • Run the security audit regularly

Quick Self-Check — You Might Already Be Exposed If:

  • Multiple users share one gateway
  • Plugins auto-install or auto-update
  • The agent can call unrestricted external endpoints
  • Memory is shared across users or unrelated workflows
  • You don't know what your allowlist actually includes

The Complementary Architecture

NemoClaw and OCTW work together, not against each other:

[user]
  ↓
[edge proxy / auth]
  ↓
[OCTW: per-tenant gateway]
  ↓
[NemoClaw: sandbox + policy]
  ↓
[OpenClaw runtime]
  ↓
[tools / plugins / memory]

OCTW handles the outer boundary between tenants. NemoClaw hardens what happens inside each tenant boundary.


Processed: 2026-03-21

Infographics

Landscape Infographic

Portrait Infographic

More from this blog

A

AI with Alex & Angus

102 posts