FAQ
FAQ
Quick answers plus deeper troubleshooting for real-world setups (local dev, VPS, multi-agent, OAuth/API keys, model failover). For runtime diagnostics, see Troubleshooting. For the full config reference, see Configuration.
First 60 seconds if something is broken
-
Quick status (first check)
Terminal window remoteclaw statusFast local summary: OS + update, gateway/service reachability, agents/sessions, provider config + runtime issues (when gateway is reachable).
-
Pasteable report (safe to share)
Terminal window remoteclaw status --allRead-only diagnosis with log tail (tokens redacted).
-
Daemon + port state
Terminal window remoteclaw gateway statusShows supervisor runtime vs RPC reachability, the probe target URL, and which config the service likely used.
-
Deep probes
Terminal window remoteclaw status --deepRuns gateway health checks + provider probes (requires a reachable gateway). See Health.
-
Tail the latest log
Terminal window remoteclaw logs --followIf RPC is down, fall back to:
Terminal window tail -f "$(ls -t /tmp/remoteclaw/remoteclaw-*.log | head -1)"File logs are separate from service logs; see Logging and Troubleshooting.
-
Run the doctor (repairs)
Terminal window remoteclaw doctorRepairs/migrates config/state + runs health checks. See Doctor.
-
Gateway snapshot
Terminal window remoteclaw health --jsonremoteclaw health --verbose # shows the target URL + config path on errorsAsks the running gateway for a full snapshot (WS-only). See Health.
Quick start and first-run setup
- **Claude Code**: [https://www.anthropic.com/claude-code/](https://www.anthropic.com/claude-code/)- **OpenAI Codex**: [https://openai.com/codex/](https://openai.com/codex/)
These tools can read the repo, run commands, inspect logs, and help fix your machine-levelsetup (PATH, services, permissions, auth files). Give them the **full source checkout** viathe hackable (git) install:
```bashcurl -fsSL https://remoteclaw.org/install.sh | bash -s -- --install-method git```
This installs RemoteClaw **from a git checkout**, so the agent can read the code + docs andreason about the exact version you are running. You can always switch back to stable laterby re-running the installer without `--install-method git`.
Tip: ask the agent to **plan and supervise** the fix (step-by-step), then execute only thenecessary commands. That keeps changes small and easier to audit.
If you discover a real bug or fix, please file a GitHub issue or send a PR:[https://github.com/remoteclaw/remoteclaw/issues](https://github.com/remoteclaw/remoteclaw/issues)[https://github.com/remoteclaw/remoteclaw/pulls](https://github.com/remoteclaw/remoteclaw/pulls)
Start with these commands (share outputs when asking for help):
```bashremoteclaw statusremoteclaw models statusremoteclaw doctor```
What they do:
- `remoteclaw status`: quick snapshot of gateway/agent health + basic config.- `remoteclaw models status`: checks provider auth + model availability.- `remoteclaw doctor`: validates and repairs common config/state issues.
Other useful CLI checks: `remoteclaw status --all`, `remoteclaw logs --follow`,`remoteclaw gateway status`, `remoteclaw health --verbose`.
Quick debug loop: [First 60 seconds if something is broken](#first-60-seconds-if-something-is-broken).Install docs: [Install](/install), [Installer flags](/install/installer), [Updating](/install/updating).```bashcurl -fsSL https://remoteclaw.org/install.sh | bashremoteclaw onboard --install-daemon```
The wizard can also build UI assets automatically. After onboarding, you typically run the Gateway on port **18789**.
From source (contributors/dev):
```bashgit clone https://github.com/remoteclaw/remoteclaw.gitcd remoteclawpnpm installpnpm buildpnpm ui:build # auto-installs UI deps on first runremoteclaw onboard```
If you don't have a global install yet, run it via `pnpm remoteclaw onboard`.- Open `http://127.0.0.1:18789/`.- If it asks for auth, paste the token from `gateway.auth.token` (or `REMOTECLAW_GATEWAY_TOKEN`) into Control UI settings.- Retrieve it from the gateway host: `remoteclaw config get gateway.auth.token` (or generate one: `remoteclaw doctor --generate-gateway-token`).
**Not on localhost:**
- **Tailscale Serve** (recommended): keep bind loopback, run `remoteclaw gateway --tailscale serve`, open `https://<magicdns>/`. If `gateway.auth.allowTailscale` is `true`, identity headers satisfy Control UI/WebSocket auth (no token, assumes trusted gateway host); HTTP APIs still require token/password.- **Tailnet bind**: run `remoteclaw gateway --bind tailnet --token "<token>"`, open `http://<tailscale-ip>:18789/`, paste token in dashboard settings.- **SSH tunnel**: `ssh -N -L 18789:127.0.0.1:18789 user@host` then open `http://127.0.0.1:18789/` and paste the token in Control UI settings.
See [Dashboard](/web/dashboard) and [Web surfaces](/web) for bind modes and auth details.If you want extra headroom (logs, media, other services), **2GB is recommended**, but it'snot a hard minimum.
Tip: a small Pi/VPS can host the Gateway, and you can pair **nodes** on your laptop/phone forlocal screen/camera/canvas or command execution. See [Nodes](/nodes).- Use a **64-bit** OS and keep Node >= 22.- Prefer the **hackable (git) install** so you can see logs and update fast.- Start without channels/skills, then add them one by one.- If you hit weird binary issues, it is usually an **ARM compatibility** problem.
Docs: [Linux](/platforms/linux), [Install](/install).1. Restart the Gateway:
```bashremoteclaw gateway restart```
2. Check status + auth:
```bashremoteclaw statusremoteclaw models statusremoteclaw logs --follow```
3. If it still hangs, run:
```bashremoteclaw doctor```
If the Gateway is remote, ensure the tunnel/Tailscale connection is up and that the UIis pointed at the right Gateway. See [Remote access](/gateway/remote).1. Install RemoteClaw on the new machine.2. Copy `$REMOTECLAW_STATE_DIR` (default: `~/.remoteclaw`) from the old machine.3. Copy your workspace (default: `~/.remoteclaw/workspace`).4. Run `remoteclaw doctor` and restart the Gateway service.
That preserves config, auth profiles, WhatsApp creds, sessions, and memory. If you're inremote mode, remember the gateway host owns the session store and workspace.
**Important:** if you only commit/push your workspace to GitHub, you're backingup **memory + bootstrap files**, but **not** session history or auth. Those liveunder `~/.remoteclaw/` (for example `~/.remoteclaw/agents/<agentId>/sessions/`).
Related: [Migrating](/install/migrating), [Where things live on disk](#where-things-live-on-disk),[Agent workspace](/concepts/agent-workspace), [Doctor](/gateway/doctor),[Remote mode](/gateway/remote).Newest entries are at the top. If the top section is marked **Unreleased**, the next datedsection is the latest shipped version. Entries are grouped by **Highlights**, **Changes**, and**Fixes** (plus docs/other sections when needed).If you still can't reach the site, the docs are mirrored on GitHub:[https://github.com/remoteclaw/remoteclaw/tree/main/docs](https://github.com/remoteclaw/remoteclaw/tree/main/docs)- `latest` = stable- `beta` = early build for testing
We ship builds to **beta**, test them, and once a build is solid we **promotethat same version to `latest`**. That's why beta and stable can point at the**same version**.
See what changed:[https://github.com/remoteclaw/remoteclaw/blob/main/CHANGELOG.md](https://github.com/remoteclaw/remoteclaw/blob/main/CHANGELOG.md)One-liners (macOS/Linux):
```bashcurl -fsSL --proto '=https' --tlsv1.2 https://remoteclaw.org/install.sh | bash -s -- --beta```
```bashcurl -fsSL --proto '=https' --tlsv1.2 https://remoteclaw.org/install.sh | bash -s -- --install-method git```
Windows installer (PowerShell):[https://remoteclaw.org/install.ps1](https://remoteclaw.org/install.ps1)
More detail: [Development channels](/install/development-channels) and [Installer flags](/install/installer).1. **Dev channel (git checkout):**
```bashremoteclaw update --channel dev```
This switches to the `main` branch and updates from source.
2. **Hackable install (from the installer site):**
```bashcurl -fsSL https://remoteclaw.org/install.sh | bash -s -- --install-method git```
That gives you a local repo you can edit, then update via git.
If you prefer a clean clone manually, use:
```bashgit clone https://github.com/remoteclaw/remoteclaw.gitcd remoteclawpnpm installpnpm build```
Docs: [Update](/cli/update), [Development channels](/install/development-channels),[Install](/install).- **Install:** 2-5 minutes- **Onboarding:** 5-15 minutes depending on how many channels/models you configure
If it hangs, use [Installer stuck](#quick-start-and-first-run-setup)and the fast debug loop in [I am stuck](#quick-start-and-first-run-setup).```bashcurl -fsSL https://remoteclaw.org/install.sh | bash -s -- --verbose```
Beta install with verbose:
```bashcurl -fsSL https://remoteclaw.org/install.sh | bash -s -- --beta --verbose```
For a hackable (git) install:
```bashcurl -fsSL https://remoteclaw.org/install.sh | bash -s -- --install-method git --verbose```
Windows (PowerShell) equivalent:
```powershell# install.ps1 has no dedicated -Verbose flag yet.Set-PSDebug -Trace 1& ([scriptblock]::Create((iwr -useb https://remoteclaw.org/install.ps1))) -NoOnboardSet-PSDebug -Trace 0```
More options: [Installer flags](/install/installer).**1) npm error spawn git / git not found**
- Install **Git for Windows** and make sure `git` is on your PATH.- Close and reopen PowerShell, then re-run the installer.
**2) remoteclaw is not recognized after install**
- Your npm global bin folder is not on PATH.- Check the path:
```powershell npm config get prefix ```
- Add that directory to your user PATH (no `\bin` suffix needed on Windows; on most systems it is `%AppData%\npm`).- Close and reopen PowerShell after updating PATH.
If you want the smoothest Windows setup, use **WSL2** instead of native Windows.Docs: [Windows](/platforms/windows).Symptoms:
- `system.run`/`exec` output renders Chinese as mojibake- The same command looks fine in another terminal profile
Quick workaround in PowerShell:
```powershellchcp 65001[Console]::InputEncoding = [System.Text.UTF8Encoding]::new($false)[Console]::OutputEncoding = [System.Text.UTF8Encoding]::new($false)$OutputEncoding = [System.Text.UTF8Encoding]::new($false)```
Then restart the Gateway and retry your command:
```powershellremoteclaw gateway restart```
If you still reproduce this on latest RemoteClaw, track/report it in:
- [Issue #30640](https://github.com/remoteclaw/remoteclaw/issues/30640)```bashcurl -fsSL https://remoteclaw.org/install.sh | bash -s -- --install-method git```
More detail: [Install](/install) and [Installer flags](/install/installer).- Linux quick path + service install: [Linux](/platforms/linux).- Full walkthrough: [Getting Started](/start/getting-started).- Installer + updates: [Install & updates](/install/updating).Guides: [exe.dev](/install/exe-dev), [Hetzner](/install/hetzner), [Fly.io](/install/fly).Remote access: [Gateway remote](/gateway/remote).- [VPS hosting](/vps) (all providers in one place)- [Fly.io](/install/fly)- [Hetzner](/install/hetzner)- [exe.dev](/install/exe-dev)
How it works in the cloud: the **Gateway runs on the server**, and you access itfrom your laptop/phone via the Control UI (or Tailscale/SSH). Your state + workspacelive on the server, so treat the host as the source of truth and back it up.
You can pair **nodes** (Mac/iOS/Android/headless) to that cloud Gateway to accesslocal screen/camera/canvas or run commands on your laptop while keeping theGateway in the cloud.
Hub: [Platforms](/platforms). Remote access: [Gateway remote](/gateway/remote).Nodes: [Nodes](/nodes), [Nodes CLI](/cli/nodes).Use the CLI:
```bashremoteclaw updateremoteclaw update statusremoteclaw update --channel stable|beta|devremoteclaw update --tag <dist-tag|version>remoteclaw update --no-restart```
If you must automate from an agent:
```bashremoteclaw update --yes --no-restartremoteclaw gateway restart```
Docs: [Update](/cli/update), [Updating](/install/updating).- **Model/auth setup** (provider OAuth/setup-token flows and API keys supported, plus local model options such as LM Studio)- **Workspace** location + bootstrap files- **Gateway settings** (bind/port/auth/tailscale)- **Providers** (WhatsApp, Telegram, Discord, Mattermost (plugin), Signal, iMessage)- **Daemon install** (LaunchAgent on macOS; systemd user unit on Linux/WSL2)- **Health checks** and **skills** selection
It also warns if your configured model is unknown or missing auth.If you choose Anthropic subscription auth, decide for yourself whether to use it:Anthropic has blocked some subscription usage outside Claude Code in the past.OpenAI Codex OAuth is explicitly supported for external tools like RemoteClaw.
Docs: [Anthropic](/providers/anthropic), [OpenAI](/providers/openai),[Local models](/gateway/local-models), [Models](/concepts/models).Claude Pro/Max subscriptions **do not include an API key**, so this is thetechnical path for subscription accounts. But this is your decision: Anthropichas blocked some subscription usage outside Claude Code in the past.If you want the clearest and safest supported path for production, use an Anthropic API key.```bashclaude setup-token```
Copy the token it prints, then choose **Anthropic token (paste setup-token)** in onboarding. If you want to run it on the gateway host, use `remoteclaw models auth setup-token --provider anthropic`. If you ran `claude setup-token` elsewhere, paste it on the gateway host with `remoteclaw models auth paste-token --provider anthropic`. See [Anthropic](/providers/anthropic).Important: this is technical compatibility, not a policy guarantee. Anthropichas blocked some subscription usage outside Claude Code in the past.You need to decide whether to use it and verify Anthropic's current terms.For production or multi-user workloads, Anthropic API key auth is the safer, recommended choice.If the message is specifically:`Extra usage is required for long context requests`, the request is trying to useAnthropic's 1M context beta (`context1m: true`). That only works when yourcredential is eligible for long-context billing (API key billing or subscriptionwith Extra Usage enabled).
Tip: set a **fallback model** so RemoteClaw can keep replying while a provider is rate-limited.See [Models](/cli/models), [OAuth](/concepts/oauth), and[/gateway/troubleshooting#anthropic-429-extra-usage-required-for-long-context](/gateway/troubleshooting#anthropic-429-extra-usage-required-for-long-context).See [OAuth](/concepts/oauth), [Model providers](/concepts/model-providers), and [Onboarding (CLI)](/start/wizard).Steps:
1. Enable the plugin: `remoteclaw plugins enable google`2. Login: `remoteclaw models auth login --provider google-gemini-cli --set-default`
This stores OAuth tokens in auth profiles on the gateway host. Details: [Model providers](/concepts/model-providers).You only need a Mac **for macOS-only tools**. For iMessage, use [BlueBubbles](/channels/bluebubbles) (recommended) - the BlueBubbles server runs on any Mac, and the Gateway can run on Linux or elsewhere. If you want other macOS-only tools, run the Gateway on a Mac or pair a macOS node.
Docs: [BlueBubbles](/channels/bluebubbles), [Nodes](/nodes), [Mac remote mode](/platforms/mac/remote).Common setups:
- Run the Gateway on Linux/VPS, and run the BlueBubbles server on any Mac signed into Messages.- Run everything on the Mac if you want the simplest single-machine setup.
Docs: [BlueBubbles](/channels/bluebubbles), [Nodes](/nodes),[Mac remote mode](/platforms/mac/remote).Common pattern:
- Gateway on the Mac mini (always-on).- MacBook Pro runs the macOS app or a node host and pairs to the Gateway.- Use `remoteclaw nodes status` / `remoteclaw nodes list` to see it.
Docs: [Nodes](/nodes), [Nodes CLI](/cli/nodes).If you still want to experiment with Bun, do it on a non-production gatewaywithout WhatsApp/Telegram.Onboarding accepts `@username` input and resolves it to a numeric ID, but RemoteClaw authorization uses numeric IDs only.
Safer (no third-party bot):
- DM your bot, then run `remoteclaw logs --follow` and read `from.id`.
Official Bot API:
- DM your bot, then call `https://api.telegram.org/bot<bot_token>/getUpdates` and read `message.from.id`.
Third-party (less private):
- DM `@userinfobot` or `@getidsbot`.
See [/channels/telegram](/channels/telegram#access-control-and-activation).```bash/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"echo 'eval "$(/home/linuxbrew/.linuxbrew/bin/brew shellenv)"' >> ~/.profileeval "$(/home/linuxbrew/.linuxbrew/bin/brew shellenv)"brew install <formula>```
If you run RemoteClaw via systemd, ensure the service PATH includes `/home/linuxbrew/.linuxbrew/bin` (or your brew prefix) so `brew`-installed tools resolve in non-login shells.Recent builds also prepend common user bin dirs on Linux systemd services (for example `~/.local/bin`, `~/.npm-global/bin`, `~/.local/share/pnpm`, `~/.bun/bin`) and honor `PNPM_HOME`, `NPM_CONFIG_PREFIX`, `BUN_INSTALL`, `VOLTA_HOME`, `ASDF_DATA_DIR`, `NVM_DIR`, and `FNM_DIR` when set.Docs: [Getting started](/start/getting-started), [Updating](/install/updating).From npm to git:
```bashgit clone https://github.com/remoteclaw/remoteclaw.gitcd remoteclawpnpm installpnpm buildremoteclaw doctorremoteclaw gateway restart```
From git to npm:
```bashnpm install -g remoteclaw@latestremoteclaw doctorremoteclaw gateway restart```
Doctor detects a gateway service entrypoint mismatch and offers to rewrite the service config to match the current install (use `--repair` in automation).
Backup tips: see [Backup strategy](#where-things-live-on-disk).**Laptop (local Gateway)**
- **Pros:** no server cost, direct access to local files, live browser window.- **Cons:** sleep/network drops = disconnects, OS updates/reboots interrupt, must stay awake.
**VPS / cloud**
- **Pros:** always-on, stable network, no laptop sleep issues, easier to keep running.- **Cons:** often run headless (use screenshots), remote file access only, you must SSH for updates.
**RemoteClaw-specific note:** WhatsApp/Telegram/Slack/Mattermost (plugin)/Discord all work fine from a VPS. The only real trade-off is **headless browser** vs a visible window. See [Browser](/tools/browser).
**Recommended default:** VPS if you had gateway disconnects before. Local is great when you're actively using the Mac and want local file access or UI automation with a visible browser.- **Dedicated host (VPS/Mac mini/Pi):** always-on, fewer sleep/reboot interruptions, cleaner permissions, easier to keep running.- **Shared laptop/desktop:** totally fine for testing and active use, but expect pauses when the machine sleeps or updates.
If you want the best of both worlds, keep the Gateway on a dedicated host and pair your laptop as a **node** for local screen/camera/exec tools. See [Nodes](/nodes).For security guidance, read [Security](/gateway/security).- **Absolute minimum:** 1 vCPU, 1GB RAM, ~500MB disk.- **Recommended:** 1-2 vCPU, 2GB RAM or more for headroom (logs, media, multiple channels). Node tools and browser automation can be resource hungry.
OS: use **Ubuntu LTS** (or any modern Debian/Ubuntu). The Linux install path is best tested there.
Docs: [Linux](/platforms/linux), [VPS hosting](/vps).Baseline guidance:
- **Absolute minimum:** 1 vCPU, 1GB RAM.- **Recommended:** 2GB RAM or more if you run multiple channels, browser automation, or media tools.- **OS:** Ubuntu LTS or another modern Debian/Ubuntu.
If you are on Windows, **WSL2 is the easiest VM style setup** and has the best toolingcompatibility. See [Windows](/platforms/windows), [VPS hosting](/vps).If you are running macOS in a VM, see [macOS VM](/install/macos-vm).What is RemoteClaw?
Highlights:
- **Your devices, your data:** run the Gateway wherever you want (Mac, Linux, VPS) and keep the workspace + session history local.- **Real channels, not a web sandbox:** WhatsApp/Telegram/Slack/Discord/Signal/iMessage/etc, plus mobile voice and Canvas on supported platforms.- **Model-agnostic:** use Anthropic, OpenAI, MiniMax, OpenRouter, etc., with per-agent routing and failover.- **Local-only option:** run local models so **all data can stay on your device** if you want.- **Multi-agent routing:** separate agents per channel, account, or task, each with its own workspace and defaults.- **Open source and hackable:** inspect, extend, and self-host without vendor lock-in.
Docs: [Gateway](/gateway), [Channels](/channels), [Multi-agent](/concepts/multi-agent),[Memory](/concepts/memory).- Build a website (WordPress, Shopify, or a simple static site).- Prototype a mobile app (outline, screens, API plan).- Organize files and folders (cleanup, naming, tagging).- Connect Gmail and automate summaries or follow ups.
It can handle large tasks, but it works best when you split them into phases anduse sub agents for parallel work.- **Personal briefings:** summaries of inbox, calendar, and news you care about.- **Research and drafting:** quick research, summaries, and first drafts for emails or docs.- **Reminders and follow ups:** cron or heartbeat driven nudges and checklists.- **Browser automation:** filling forms, collecting data, and repeating web tasks.- **Cross device coordination:** send a task from your phone, let the Gateway run it on a server, and get the result back in chat.For **outreach or ad runs**, keep a human in the loop. Avoid spam, follow local laws andplatform policies, and review anything before it is sent. The safest pattern is to letRemoteClaw draft and you approve.
Docs: [Security](/gateway/security).Advantages:
- **Persistent memory + workspace** across sessions- **Multi-platform access** (WhatsApp, Telegram, TUI, WebChat)- **Tool orchestration** (browser, files, scheduling, hooks)- **Always-on Gateway** (run on a VPS, interact from anywhere)- **Nodes** for local browser/screen/camera/exec
Showcase: [https://remoteclaw.org/showcase](https://remoteclaw.org/showcase)Skills and automation
- **Cron jobs**: isolated jobs can set a `model` override per job.- **Sub-agents**: route tasks to separate agents with different default models.- **On-demand switch**: use `/model` to switch the current session model at any time.
See [Cron jobs](/automation/cron-jobs), [Multi-Agent Routing](/concepts/multi-agent), and [Slash commands](/tools/slash-commands).Ask your bot to "spawn a sub-agent for this task" or use `/subagents`.Use `/status` in chat to see what the Gateway is doing right now (and whether it is busy).
Token tip: long tasks and sub-agents both consume tokens. If cost is a concern, set acheaper model for sub-agents via `agents.defaults.subagents.model`.
Docs: [Sub-agents](/tools/subagents).Basic flow:
- Spawn with `sessions_spawn` using `thread: true` (and optionally `mode: "session"` for persistent follow-up).- Or manually bind with `/focus <target>`.- Use `/agents` to inspect binding state.- Use `/session idle <duration|off>` and `/session max-age <duration|off>` to control auto-unfocus.- Use `/unfocus` to detach the thread.
Required config:
- Global defaults: `session.threadBindings.enabled`, `session.threadBindings.idleHours`, `session.threadBindings.maxAgeHours`.- Discord overrides: `channels.discord.threadBindings.enabled`, `channels.discord.threadBindings.idleHours`, `channels.discord.threadBindings.maxAgeHours`.- Auto-bind on spawn: set `channels.discord.threadBindings.spawnSubagentSessions: true`.
Docs: [Sub-agents](/tools/subagents), [Discord](/channels/discord), [Configuration Reference](/gateway/configuration-reference), [Slash commands](/tools/slash-commands).Checklist:
- Confirm cron is enabled (`cron.enabled`) and `REMOTECLAW_SKIP_CRON` is not set.- Check the Gateway is running 24/7 (no sleep/restarts).- Verify timezone settings for the job (`--tz` vs host timezone).
Debug:
```bashremoteclaw cron run <jobId> --forceremoteclaw cron runs --id <jobId> --limit 50```
Docs: [Cron jobs](/automation/cron-jobs), [Cron vs Heartbeat](/automation/cron-vs-heartbeat).```bashremoteclaw skills search "calendar"remoteclaw skills install <skill-slug>remoteclaw skills update --all```
Install the separate `clawhub` CLI only if you want to publish or sync your own skills.- **Cron jobs** for scheduled or recurring tasks (persist across restarts).- **Heartbeat** for "main session" periodic checks.- **Isolated jobs** for autonomous agents that post summaries or deliver to chats.
Docs: [Cron jobs](/automation/cron-jobs), [Cron vs Heartbeat](/automation/cron-vs-heartbeat),[Heartbeat](/gateway/heartbeat).You have three supported patterns:
**Option A - run the Gateway on a Mac (simplest).**Run the Gateway where the macOS binaries exist, then connect from Linux in [remote mode](#gateway-ports-already-running-and-remote-mode) or over Tailscale. The skills load normally because the Gateway host is macOS.
**Option B - use a macOS node (no SSH).**Run the Gateway on Linux, pair a macOS node (menubar app), and set **Node Run Commands** to "Always Ask" or "Always Allow" on the Mac. RemoteClaw can treat macOS-only skills as eligible when the required binaries exist on the node. The agent runs those skills via the `nodes` tool. If you choose "Always Ask", approving "Always Allow" in the prompt adds that command to the allowlist.
**Option C - proxy macOS binaries over SSH (advanced).**Keep the Gateway on Linux, but make the required CLI binaries resolve to SSH wrappers that run on a Mac. Then override the skill to allow Linux so it stays eligible.
1. Create an SSH wrapper for the binary (example: `memo` for Apple Notes):
```bash #!/usr/bin/env bash set -euo pipefail exec ssh -T user@mac-host /opt/homebrew/bin/memo "$@" ```
2. Put the wrapper on `PATH` on the Linux host (for example `~/bin/memo`).3. Override the skill metadata (workspace or `~/.remoteclaw/skills`) to allow Linux:
```markdown --- name: apple-notes description: Manage Apple Notes via the memo CLI on macOS. metadata: { "remoteclaw": { "os": ["darwin", "linux"], "requires": { "bins": ["memo"] } } } --- ```
4. Start a new session so the skills snapshot refreshes.Options:
- **Custom skill / plugin:** best for reliable API access (Notion/HeyGen both have APIs).- **Browser automation:** works without code but is slower and more fragile.
If you want to keep context per client (agency workflows), a simple pattern is:
- One Notion page per client (context + preferences + active work).- Ask the agent to fetch that page at the start of a session.
If you want a native integration, open a feature request or build a skilltargeting those APIs.
Install skills:
```bashremoteclaw skills install <skill-slug>remoteclaw skills update --all```
Native installs land in the active workspace `skills/` directory. For shared skills across agents, place them in `~/.remoteclaw/skills/<name>/SKILL.md`. Some skills expect binaries installed via Homebrew; on Linux that means Linuxbrew (see the Homebrew Linux FAQ entry above). See [Skills](/tools/skills) and [ClawHub](/tools/clawhub).```bashremoteclaw browser --browser-profile user tabsremoteclaw browser --browser-profile user snapshot```
If you want a custom name, create an explicit MCP profile:
```bashremoteclaw browser create-profile --name chrome-live --driver existing-sessionremoteclaw browser --browser-profile chrome-live tabs```
This path is host-local. If the Gateway runs elsewhere, either run a node host on the browser machine or use remote CDP instead.Sandboxing and memory
- Persist `/home/node` with `REMOTECLAW_HOME_VOLUME` so caches survive.- Bake system deps into the image with `REMOTECLAW_DOCKER_APT_PACKAGES`.- Install Playwright browsers via the bundled CLI: `node /app/node_modules/playwright-core/cli.js install chromium`- Set `PLAYWRIGHT_BROWSERS_PATH` and ensure the path is persisted.
Docs: [Docker](/install/docker), [Browser](/tools/browser).Use `agents.defaults.sandbox.mode: "non-main"` so group/channel sessions (non-main keys) run in Docker, while the main DM session stays on-host. Then restrict what tools are available in sandboxed sessions via `tools.sandbox.tools`.
Setup walkthrough + example config: [Groups: personal DMs + public groups](/channels/groups#pattern-personal-dms-public-groups-single-agent)
Key config reference: [Gateway configuration](/gateway/configuration-reference#agentsdefaultssandbox)- Daily notes in `memory/YYYY-MM-DD.md`- Curated long-term notes in `MEMORY.md` (main/private sessions only)
RemoteClaw also runs a **silent pre-compaction memory flush** to remind the modelto write durable notes before auto-compaction. This only runs when the workspaceis writable (read-only sandboxes skip it). See [Memory](/concepts/memory).This is still an area we are improving. It helps to remind the model to store memories;it will know what to do. If it keeps forgetting, verify the Gateway is using the sameworkspace on every run.
Docs: [Memory](/concepts/memory), [Agent workspace](/concepts/agent-workspace).Docs: [Memory](/concepts/memory), [Context](/concepts/context).If you don't set a provider explicitly, RemoteClaw auto-selects a provider when itcan resolve an API key (auth profiles, `models.providers.*.apiKey`, or env vars).It prefers OpenAI if an OpenAI key resolves, otherwise Gemini if a Gemini keyresolves, then Voyage, then Mistral. If no remote key is available, memorysearch stays disabled until you configure it. If you have a local model pathconfigured and present, RemoteClawprefers `local`. Ollama is supported when you explicitly set`memorySearch.provider = "ollama"`.
If you'd rather stay local, set `memorySearch.provider = "local"` (and optionally`memorySearch.fallback = "none"`). If you want Gemini embeddings, set`memorySearch.provider = "gemini"` and provide `GEMINI_API_KEY` (or`memorySearch.remote.apiKey`). We support **OpenAI, Gemini, Voyage, Mistral, Ollama, or local** embeddingmodels - see [Memory](/concepts/memory) for the setup details.Where things live on disk
- **Local by default:** sessions, memory files, config, and workspace live on the Gateway host (`~/.remoteclaw` + your workspace directory).- **Remote by necessity:** messages you send to model providers (Anthropic/OpenAI/etc.) go to their APIs, and chat platforms (WhatsApp/Telegram/Slack/etc.) store message data on their servers.- **You control the footprint:** using local models keeps prompts on your machine, but channel traffic still goes through the channel's servers.
Related: [Agent workspace](/concepts/agent-workspace), [Memory](/concepts/memory).| Path | Purpose || --------------------------------------------------------------- | ------------------------------------------------------------------ || `$REMOTECLAW_STATE_DIR/remoteclaw.json` | Main config (JSON5) || `$REMOTECLAW_STATE_DIR/credentials/oauth.json` | Legacy OAuth import (copied into auth profiles on first use) || `$REMOTECLAW_STATE_DIR/agents/<agentId>/agent/auth-profiles.json` | Auth profiles (OAuth, API keys, and optional `keyRef`/`tokenRef`) || `$REMOTECLAW_STATE_DIR/secrets.json` | Optional file-backed secret payload for `file` SecretRef providers || `$REMOTECLAW_STATE_DIR/agents/<agentId>/agent/auth.json` | Legacy compatibility file (static `api_key` entries scrubbed) || `$REMOTECLAW_STATE_DIR/credentials/` | Provider state (e.g. `whatsapp/<accountId>/creds.json`) || `$REMOTECLAW_STATE_DIR/agents/` | Per-agent state (agentDir + sessions) || `$REMOTECLAW_STATE_DIR/agents/<agentId>/sessions/` | Conversation history & state (per agent) || `$REMOTECLAW_STATE_DIR/agents/<agentId>/sessions/sessions.json` | Session metadata (per agent) |
Legacy single-agent path: `~/.remoteclaw/agent/*` (migrated by `remoteclaw doctor`).
Your **workspace** (AGENTS.md, memory files, skills, etc.) is separate and configured via `agents.defaults.workspace` (default: `~/.remoteclaw/workspace`).- **Workspace (per agent)**: `AGENTS.md`, `SOUL.md`, `IDENTITY.md`, `USER.md`, `MEMORY.md` (or legacy fallback `memory.md` when `MEMORY.md` is absent), `memory/YYYY-MM-DD.md`, optional `HEARTBEAT.md`.- **State dir (`~/.remoteclaw`)**: config, credentials, auth profiles, sessions, logs, and shared skills (`~/.remoteclaw/skills`).
Default workspace is `~/.remoteclaw/workspace`, configurable via:
```json5{ agents: { defaults: { workspace: "~/.remoteclaw/workspace" } },}```
If the bot "forgets" after a restart, confirm the Gateway is using the sameworkspace on every launch (and remember: remote mode uses the **gateway host's**workspace, not your local laptop).
Tip: if you want a durable behavior or preference, ask the bot to **write it intoAGENTS.md or MEMORY.md** rather than relying on chat history.
See [Agent workspace](/concepts/agent-workspace) and [Memory](/concepts/memory).Do **not** commit anything under `~/.remoteclaw` (credentials, sessions, tokens, or encrypted secrets payloads).If you need a full restore, back up both the workspace and the state directoryseparately (see the migration question above).
Docs: [Agent workspace](/concepts/agent-workspace).Example (repo as default cwd):
```json5{ agents: { defaults: { workspace: "~/Projects/my-repo", }, },}```Config basics
```$REMOTECLAW_CONFIG_PATH```
If the file is missing, it uses safe-ish defaults (including a default workspace of `~/.remoteclaw/workspace`).```json5{ gateway: { bind: "lan", auth: { mode: "token", token: "replace-me", }, },}```
Notes:
- `gateway.remote.token` / `.password` do **not** enable local gateway auth by themselves.- Local call paths can use `gateway.remote.*` as fallback only when `gateway.auth.*` is unset.- If `gateway.auth.token` / `gateway.auth.password` is explicitly configured via SecretRef and unresolved, resolution fails closed (no remote fallback masking).- The Control UI authenticates via `connect.params.auth.token` (stored in app/UI settings). Avoid putting tokens in URLs.If you **really** want open loopback, set `gateway.auth.mode: "none"` explicitly in your config. Doctor can generate a token for you any time: `remoteclaw doctor --generate-gateway-token`.- `gateway.reload.mode: "hybrid"` (default): hot-apply safe changes, restart for critical ones- `hot`, `restart`, `off` are also supported```json5{ cli: { banner: { taglineMode: "off", // random | default | off }, },}```
- `off`: hides tagline text but keeps the banner title/version line.- `default`: uses `All your chats, one RemoteClaw.` every time.- `random`: rotating funny/seasonal taglines (default behavior).- If you want no banner at all, set env `REMOTECLAW_HIDE_BANNER=1`.- Brave: `BRAVE_API_KEY`- Gemini: `GEMINI_API_KEY`- Grok: `XAI_API_KEY`- Kimi: `KIMI_API_KEY` or `MOONSHOT_API_KEY`- Perplexity: `PERPLEXITY_API_KEY` or `OPENROUTER_API_KEY`
```json5{ plugins: { entries: { brave: { config: { webSearch: { apiKey: "BRAVE_API_KEY_HERE", }, }, }, }, }, tools: { web: { search: { enabled: true, provider: "brave", maxResults: 5, }, fetch: { enabled: true, }, }, },}```
Provider-specific web-search config now lives under `plugins.entries.<plugin>.config.webSearch.*`.Legacy `tools.web.search.*` provider paths still load temporarily for compatibility, but they should not be used for new configs.
Notes:
- If you use allowlists, add `web_search`/`web_fetch` or `group:web`.- `web_fetch` is enabled by default (unless explicitly disabled).- Daemons read env vars from `~/.remoteclaw/.env` (or the service environment).
Docs: [Web tools](/tools/web).Recover:
- Restore from backup (git or a copied `~/.remoteclaw/remoteclaw.json`).- If you have no backup, re-run `remoteclaw doctor` and reconfigure channels/models.- If this was unexpected, file a bug and include your last known config or any backup.- A local coding agent can often reconstruct a working config from logs or history.
Avoid it:
- Use `remoteclaw config set` for small changes.- Use `remoteclaw configure` for interactive edits.
Docs: [Config](/cli/config), [Configure](/cli/configure), [Doctor](/gateway/doctor).- **Gateway (central):** owns channels (Signal/WhatsApp), routing, and sessions.- **Nodes (devices):** Macs/iOS/Android connect as peripherals and expose local tools (`system.run`, `canvas`, `camera`).- **Agents (workers):** separate brains/workspaces for special roles (e.g. "Hetzner ops", "Personal data").- **Sub-agents:** spawn background work from a main agent when you want parallelism.- **TUI:** connect to the Gateway and switch agents/sessions.
Docs: [Nodes](/nodes), [Remote access](/gateway/remote), [Multi-Agent Routing](/concepts/multi-agent), [Sub-agents](/tools/subagents), [TUI](/web/tui).```json5{ browser: { headless: true }, agents: { defaults: { sandbox: { browser: { headless: true } }, }, },}```
Default is `false` (headful). Headless is more likely to trigger anti-bot checks on some sites. See [Browser](/tools/browser).
Headless uses the **same Chromium engine** and works for most automation (forms, clicks, scraping, logins). The main differences:
- No visible browser window (use screenshots if you need visuals).- Some sites are stricter about automation in headless mode (CAPTCHAs, anti-bot). For example, X/Twitter often blocks headless sessions.Remote gateways and nodes
Telegram → Gateway → Agent → `node.*` → Node → Gateway → Telegram
Nodes don't see inbound provider traffic; they only receive node RPC calls.Typical setup:
1. Run the Gateway on the always-on host (VPS/home server).2. Put the Gateway host + your computer on the same tailnet.3. Ensure the Gateway WS is reachable (tailnet bind or SSH tunnel).4. Open the macOS app locally and connect in **Remote over SSH** mode (or direct tailnet) so it can register as a node.5. Approve the node on the Gateway:
```bash remoteclaw devices list remoteclaw devices approve <requestId> ```
No separate TCP bridge is required; nodes connect over the Gateway WebSocket.
Security reminder: pairing a macOS node allows `system.run` on that machine. Onlypair devices you trust, and review [Security](/gateway/security).
Docs: [Nodes](/nodes), [Gateway protocol](/gateway/protocol), [macOS remote mode](/platforms/mac/remote), [Security](/gateway/security).- Gateway is running: `remoteclaw gateway status`- Gateway health: `remoteclaw status`- Channel health: `remoteclaw channels status`
Then verify auth and routing:
- If you use Tailscale Serve, make sure `gateway.auth.allowTailscale` is set correctly.- If you connect via SSH tunnel, confirm the local tunnel is up and points at the right port.- Confirm your allowlists (DM or group) include your account.
Docs: [Tailscale](/gateway/tailscale), [Remote access](/gateway/remote), [Channels](/channels).**Simplest:** use a normal chat channel both bots can access (Telegram/Slack/WhatsApp).Have Bot A send a message to Bot B, then let Bot B reply as usual.
**CLI bridge (generic):** run a script that calls the other Gateway with`remoteclaw agent --message ... --deliver`, targeting a chat where the other botlistens. If one bot is on a remote VPS, point your CLI at that remote Gatewayvia SSH/Tailscale (see [Remote access](/gateway/remote)).
Example pattern (run from a machine that can reach the target Gateway):
```bashremoteclaw agent --message "Hello from local bot" --deliver --channel telegram --reply-to <chat-id>```
Tip: add a guardrail so the two bots do not loop endlessly (mention-only, channelallowlists, or a "do not reply to bot messages" rule).
Docs: [Remote access](/gateway/remote), [Agent CLI](/cli/agent), [Agent send](/tools/agent-send).Use separate VPSes only when you need hard isolation (security boundaries) or verydifferent configs that you do not want to share. Otherwise, keep one Gateway anduse multiple agents or sub-agents.- **No inbound SSH required.** Nodes connect out to the Gateway WebSocket and use device pairing.- **Safer execution controls.** `system.run` is gated by node allowlists/approvals on that laptop.- **More device tools.** Nodes expose `canvas`, `camera`, and `screen` in addition to `system.run`.- **Local browser automation.** Keep the Gateway on a VPS, but run Chrome locally through a node host on the laptop, or attach to local Chrome on the host via Chrome MCP.
SSH is fine for ad-hoc shell access, but nodes are simpler for ongoing agent workflows anddevice automation.
Docs: [Nodes](/nodes), [Nodes CLI](/cli/nodes), [Browser](/tools/browser).A full restart is required for `gateway`, `discovery`, and `canvasHost` changes.This sets your workspace and restricts who can trigger the bot.1. **Install + login on the VPS**
```bash curl -fsSL https://tailscale.com/install.sh | sh sudo tailscale up ```
2. **Install + login on your Mac** - Use the Tailscale app and sign in to the same tailnet.3. **Enable MagicDNS (recommended)** - In the Tailscale admin console, enable MagicDNS so the VPS has a stable name.4. **Use the tailnet hostname** - SSH: `ssh user@your-vps.tailnet-xxxx.ts.net` - Gateway WS: `ws://your-vps.tailnet-xxxx.ts.net:18789`
If you want the Control UI without SSH, use Tailscale Serve on the VPS:
```bashremoteclaw gateway --tailscale serve```
This keeps the gateway bound to loopback and exposes HTTPS via Tailscale. See [Tailscale](/gateway/tailscale).Recommended setup:
1. **Make sure the VPS + Mac are on the same tailnet**.2. **Use the macOS app in Remote mode** (SSH target can be the tailnet hostname). The app will tunnel the Gateway port and connect as a node.3. **Approve the node** on the gateway:
```bash remoteclaw devices list remoteclaw devices approve <requestId> ```
Docs: [Gateway protocol](/gateway/protocol), [Discovery](/gateway/discovery), [macOS remote mode](/platforms/mac/remote).Install a second Gateway only when you need **hard isolation** or two fully separate bots.
Docs: [Nodes](/nodes), [Nodes CLI](/cli/nodes), [Multiple gateways](/gateway/multiple-gateways).Env vars and .env loading
- `.env` from the current working directory- a global fallback `.env` from `~/.remoteclaw/.env` (aka `$REMOTECLAW_STATE_DIR/.env`)
Neither `.env` file overrides existing env vars.
You can also define inline env vars in config (applied only if missing from the process env):
```json5{ env: { OPENROUTER_API_KEY: "sk-or-...", vars: { GROQ_API_KEY: "gsk-..." }, },}```
See [/environment](/help/environment) for full precedence and sources.1. Put the missing keys in `~/.remoteclaw/.env` so they're picked up even when the service doesn't inherit your shell env.2. Enable shell import (opt-in convenience):
```json5{ env: { shellEnv: { enabled: true, timeoutMs: 15000, }, },}```
This runs your login shell and imports only missing expected keys (never overrides). Env var equivalents:`REMOTECLAW_LOAD_SHELL_ENV=1`, `REMOTECLAW_SHELL_ENV_TIMEOUT_MS=15000`.If the Gateway runs as a service (launchd/systemd), it won't inherit your shellenvironment. Fix by doing one of these:
1. Put the token in `~/.remoteclaw/.env`:
``` COPILOT_GITHUB_TOKEN=... ```
2. Or enable shell import (`env.shellEnv.enabled: true`).3. Or add it to your config `env` block (applies only if missing).
Then restart the gateway and recheck:
```bashremoteclaw models status```
Copilot tokens are read from `COPILOT_GITHUB_TOKEN` (also `GH_TOKEN` / `GITHUB_TOKEN`).See [/concepts/model-providers](/concepts/model-providers) and [/environment](/help/environment).Sessions and multiple chats
```json5{ session: { idleMinutes: 240, },}```That said, this is best seen as a **fun experiment**. It is token heavy and oftenless efficient than using one bot with separate sessions. The typical model weenvision is one bot you talk to, with different sessions for parallel work. Thatbot can also spawn sub-agents when needed.
Docs: [Multi-agent routing](/concepts/multi-agent), [Sub-agents](/tools/subagents), [Agents CLI](/cli/agents).What helps:
- Ask the bot to summarize the current state and write it to a file.- Use `/compact` before long tasks, and `/new` when switching topics.- Keep important context in the workspace and ask the bot to read it back.- Use sub-agents for long or parallel work so the main chat stays smaller.- Pick a model with a larger context window if this happens often.```bashremoteclaw reset```
Non-interactive full reset:
```bashremoteclaw reset --scope full --yes --non-interactive```
Then re-run setup:
```bashremoteclaw onboard --install-daemon```
Notes:
- Onboarding also offers **Reset** if it sees an existing config. See [Onboarding (CLI)](/start/wizard).- If you used profiles (`--profile` / `REMOTECLAW_PROFILE`), reset each state dir (defaults are `~/.remoteclaw-<profile>`).- Dev reset: `remoteclaw gateway --dev --reset` (dev-only; wipes dev config + credentials + sessions + workspace).- **Compact** (keeps the conversation but summarizes older turns):
``` /compact ```
or `/compact <instructions>` to guide the summary.
- **Reset** (fresh session ID for the same chat key):
``` /new /reset ```
If it keeps happening:
- Enable or tune **session pruning** (`agents.defaults.contextPruning`) to trim old tool output.- Use a model with a larger context window.
Docs: [Compaction](/concepts/compaction), [Session pruning](/concepts/session-pruning), [Session management](/concepts/session).Fix: start a fresh session with `/new` (standalone message).```json5{ agents: { defaults: { heartbeat: { every: "2h", // or "0m" to disable }, }, },}```
If `HEARTBEAT.md` exists but is effectively empty (only blank lines and markdownheaders like `# Heading`), RemoteClaw skips the heartbeat run to save API calls.If the file is missing, the heartbeat still runs and the model decides what to do.
Per-agent overrides use `agents.list[].heartbeat`. Docs: [Heartbeat](/gateway/heartbeat).If you want only **you** to be able to trigger group replies:
```json5{ channels: { whatsapp: { groupPolicy: "allowlist", groupAllowFrom: ["+15551234567"], }, },}``````bashremoteclaw logs --follow --json```
Look for `chatId` (or `from`) ending in `@g.us`, like:`1234567890-1234567890@g.us`.
Option 2 (if already configured/allowlisted): list groups from config:
```bashremoteclaw directory groups list --channel whatsapp```
Docs: [WhatsApp](/channels/whatsapp), [Directory](/cli/directory), [Logs](/cli/logs).- Mention gating is on (default). You must @mention the bot (or match `mentionPatterns`).- You configured `channels.whatsapp.groups` without `"*"` and the group isn't allowlisted.
See [Groups](/channels/groups) and [Group messages](/channels/group-messages).- **Disk growth:** sessions + transcripts live under `~/.remoteclaw/agents/<agentId>/sessions/`.- **Token cost:** more agents means more concurrent model usage.- **Ops overhead:** per-agent auth profiles, workspaces, and channel routing.
Tips:
- Keep one **active** workspace per agent (`agents.defaults.workspace`).- Prune old sessions (delete JSONL or store entries) if disk grows.- Use `remoteclaw doctor` to spot stray workspaces and profile mismatches.Browser access is powerful but not "do anything a human can" - anti-bot, CAPTCHAs, and MFA canstill block automation. For the most reliable browser control, use local Chrome MCP on the host,or use CDP on the machine that actually runs the browser.
Best-practice setup:
- Always-on Gateway host (VPS/Mac mini).- One agent per role (bindings).- Slack channel(s) bound to those agents.- Local browser via Chrome MCP or a node when needed.
Docs: [Multi-Agent Routing](/concepts/multi-agent), [Slack](/channels/slack),[Browser](/tools/browser), [Nodes](/nodes).Models: defaults, selection, aliases, switching
```agents.defaults.model.primary```
Models are referenced as `provider/model` (example: `anthropic/claude-opus-4-6`). If you omit the provider, RemoteClaw currently assumes `anthropic` as a temporary deprecation fallback - but you should still **explicitly** set `provider/model`.MiniMax has its own docs: [MiniMax](/providers/minimax) and[Local models](/gateway/local-models).
Rule of thumb: use the **best model you can afford** for high-stakes work, and a cheapermodel for routine chat or summaries. You can route models per agent and use sub-agents toparallelize long tasks (each sub-agent consumes tokens). See [Models](/concepts/models) and[Sub-agents](/tools/subagents).
Strong warning: weaker/over-quantized models are more vulnerable to promptinjection and unsafe behavior. See [Security](/gateway/security).
More context: [Models](/concepts/models).Safe options:
- `/model` in chat (quick, per-session)- `remoteclaw models set ...` (updates just model config)- `remoteclaw configure --section model` (interactive)- edit `agents.defaults.model` in `~/.remoteclaw/remoteclaw.json`
Avoid `config.apply` with a partial object unless you intend to replace the whole config.If you did overwrite config, restore from backup or re-run `remoteclaw doctor` to repair.
Docs: [Models](/concepts/models), [Configure](/cli/configure), [Config](/cli/config), [Doctor](/gateway/doctor).Quickest setup:
1. Install Ollama from `https://ollama.com/download`2. Pull a local model such as `ollama pull glm-4.7-flash`3. If you want Ollama Cloud too, run `ollama signin`4. Run `remoteclaw onboard` and choose `Ollama`5. Pick `Local` or `Cloud + Local`
Notes:
- `Cloud + Local` gives you Ollama Cloud models plus your local Ollama models- cloud models such as `kimi-k2.5:cloud` do not need a local pull- for manual switching, use `remoteclaw models list` and `remoteclaw models set ollama/<model>`
Security note: smaller or heavily quantized models are more vulnerable to promptinjection. We strongly recommend **large models** for any bot that can use tools.If you still want small models, enable sandboxing and strict tool allowlists.
Docs: [Ollama](/providers/ollama), [Local models](/gateway/local-models),[Model providers](/concepts/model-providers), [Security](/gateway/security),[Sandboxing](/gateway/sandboxing).```/model sonnet/model haiku/model opus/model gpt/model gpt-mini/model gemini/model gemini-flash```
You can list available models with `/model`, `/model list`, or `/model status`.
`/model` (and `/model list`) shows a compact, numbered picker. Select by number:
```/model 3```
You can also force a specific auth profile for the provider (per session):
```/model opus@anthropic:default/model opus@anthropic:work```
Tip: `/model status` shows which agent is active, which `auth-profiles.json` file is being used, and which auth profile will be tried next.It also shows the configured provider endpoint (`baseUrl`) and API mode (`api`) when available.
**How do I unpin a profile I set with @profile?**
Re-run `/model` **without** the `@profile` suffix:
```/model anthropic/claude-opus-4-6```
If you want to return to the default, pick it from `/model` (or send `/model <default provider/model>`).Use `/model status` to confirm which auth profile is active.- **Quick switch (per session):** `/model gpt-5.2` for daily tasks, `/model openai-codex/gpt-5.4` for coding with Codex OAuth.- **Default + switch:** set `agents.defaults.model.primary` to `openai/gpt-5.2`, then switch to `openai-codex/gpt-5.4` when coding (or the other way around).- **Sub-agents:** route coding tasks to sub-agents with a different default model.
See [Models](/concepts/models) and [Slash commands](/tools/slash-commands).```Model "provider/model" is not allowed. Use /model to list available models.```
That error is returned **instead of** a normal reply. Fix: add the model to`agents.defaults.models`, remove the allowlist, or pick a model from `/model list`.Fix checklist:
1. Upgrade to a current RemoteClaw release (or run from source `main`), then restart the gateway.2. Make sure MiniMax is configured (wizard or JSON), or that a MiniMax API key exists in env/auth profiles so the provider can be injected.3. Use the exact model id (case-sensitive): `minimax/MiniMax-M2.7`, `minimax/MiniMax-M2.7-highspeed`, `minimax/MiniMax-M2.5`, or `minimax/MiniMax-M2.5-highspeed`.4. Run:
```bash remoteclaw models list ```
and pick from the list (or `/model list` in chat).
See [MiniMax](/providers/minimax) and [Models](/concepts/models).**Option A: switch per session**
```json5{ env: { MINIMAX_API_KEY: "sk-...", OPENAI_API_KEY: "sk-..." }, agents: { defaults: { model: { primary: "minimax/MiniMax-M2.7" }, models: { "minimax/MiniMax-M2.7": { alias: "minimax" }, "openai/gpt-5.2": { alias: "gpt" }, }, }, },}```
Then:
```/model gpt```
**Option B: separate agents**
- Agent A default: MiniMax- Agent B default: OpenAI- Route by agent or use `/agent` to switch
Docs: [Models](/concepts/models), [Multi-Agent Routing](/concepts/multi-agent), [MiniMax](/providers/minimax), [OpenAI](/providers/openai).- `opus` → `anthropic/claude-opus-4-6`- `sonnet` → `anthropic/claude-sonnet-4-6`- `gpt` → `openai/gpt-5.4`- `gpt-mini` → `openai/gpt-5-mini`- `gemini` → `google/gemini-3.1-pro-preview`- `gemini-flash` → `google/gemini-3-flash-preview`- `gemini-flash-lite` → `google/gemini-3.1-flash-lite-preview`
If you set your own alias with the same name, your value wins.```json5{ agents: { defaults: { model: { primary: "anthropic/claude-opus-4-6" }, models: { "anthropic/claude-opus-4-6": { alias: "opus" }, "anthropic/claude-sonnet-4-6": { alias: "sonnet" }, "anthropic/claude-haiku-4-5": { alias: "haiku" }, }, }, },}```
Then `/model sonnet` (or `/<alias>` when supported) resolves to that model ID.```json5{ agents: { defaults: { model: { primary: "openrouter/anthropic/claude-sonnet-4-6" }, models: { "openrouter/anthropic/claude-sonnet-4-6": {} }, }, }, env: { OPENROUTER_API_KEY: "sk-or-..." },}```
Z.AI (GLM models):
```json5{ agents: { defaults: { model: { primary: "zai/glm-5" }, models: { "zai/glm-5": {} }, }, }, env: { ZAI_API_KEY: "..." },}```
If you reference a provider/model but the required provider key is missing, you'll get a runtime auth error (e.g. `No API key found for provider "zai"`).
**No API key found for provider after adding a new agent**
This usually means the **new agent** has an empty auth store. Auth is per-agent andstored in:
```~/.remoteclaw/agents/<agentId>/agent/auth-profiles.json```
Fix options:
- Run `remoteclaw agents add <id>` and configure auth during the wizard.- Or copy `auth-profiles.json` from the main agent's `agentDir` into the new agent's `agentDir`.
Do **not** reuse `agentDir` across agents; it causes auth/session collisions.Model failover and “All models failed”
1. **Auth profile rotation** within the same provider.2. **Model fallback** to the next model in `agents.defaults.model.fallbacks`.
Cooldowns apply to failing profiles (exponential backoff), so RemoteClaw can keep responding even when a provider is rate-limited or temporarily failing.**Fix checklist:**
- **Confirm where auth profiles live** (new vs legacy paths) - Current: `~/.remoteclaw/agents/<agentId>/agent/auth-profiles.json` - Legacy: `~/.remoteclaw/agent/*` (migrated by `remoteclaw doctor`)- **Confirm your env var is loaded by the Gateway** - If you set `ANTHROPIC_API_KEY` in your shell but run the Gateway via systemd/launchd, it may not inherit it. Put it in `~/.remoteclaw/.env` or enable `env.shellEnv`.- **Make sure you're editing the correct agent** - Multi-agent setups mean there can be multiple `auth-profiles.json` files.- **Sanity-check model/auth status** - Use `remoteclaw models status` to see configured models and whether providers are authenticated.
**Fix checklist for "No credentials found for profile anthropic"**
This means the run is pinned to an Anthropic auth profile, but the Gatewaycan't find it in its auth store.
- **Use a setup-token** - Run `claude setup-token`, then paste it with `remoteclaw models auth setup-token --provider anthropic`. - If the token was created on another machine, use `remoteclaw models auth paste-token --provider anthropic`.- **If you want to use an API key instead** - Put `ANTHROPIC_API_KEY` in `~/.remoteclaw/.env` on the **gateway host**. - Clear any pinned order that forces a missing profile:
```bash remoteclaw models auth order clear --provider anthropic ```
- **Confirm you're running commands on the gateway host** - In remote mode, auth profiles live on the gateway machine, not your laptop.Fix: either provide Google auth, or remove/avoid Google models in `agents.defaults.model.fallbacks` / aliases so fallback doesn't route there.
**LLM request rejected: thinking signature required (Google Antigravity)**
Cause: the session history contains **thinking blocks without signatures** (often froman aborted/partial stream). Google Antigravity requires signatures for thinking blocks.
Fix: RemoteClaw now strips unsigned thinking blocks for Google Antigravity Claude. If it still appears, start a **new session** or set `/thinking off` for that agent.Auth profiles: what they are and how to manage them
Related: /concepts/oauth (OAuth flows, token storage, multi-account patterns)
```~/.remoteclaw/agents/<agentId>/agent/auth-profiles.json```- `anthropic:default` (common when no email identity exists)- `anthropic:<email>` for OAuth identities- custom IDs you choose (e.g. `anthropic:work`)RemoteClaw may temporarily skip a profile if it's in a short **cooldown** (rate limits/timeouts/auth failures) or a longer **disabled** state (billing/insufficient credits). To inspect this, run `remoteclaw models status --json` and check `auth.unusableProfiles`. Tuning: `auth.cooldowns.billingBackoffHours*`.
You can also set a **per-agent** order override (stored in that agent's `auth-profiles.json`) via the CLI:
```bash# Defaults to the configured default agent (omit --agent)remoteclaw models auth order get --provider anthropic
# Lock rotation to a single profile (only try this one)remoteclaw models auth order set --provider anthropic anthropic:default
# Or set an explicit order (fallback within provider)remoteclaw models auth order set --provider anthropic anthropic:work anthropic:default
# Clear override (fall back to config auth.order / round-robin)remoteclaw models auth order clear --provider anthropic```
To target a specific agent:
```bashremoteclaw models auth order set --provider anthropic --agent main anthropic:default```- **OAuth** often leverages subscription access (where applicable).- **API keys** use pay-per-token billing.
The wizard explicitly supports Anthropic setup-token and OpenAI Codex OAuth and can store API keys for you.Gateway: ports, “already running”, and remote mode
Precedence:
```--port > REMOTECLAW_GATEWAY_PORT > gateway.port > default 18789```Use `remoteclaw gateway status` and trust these lines:
- `Probe target:` (the URL the probe actually used)- `Listening:` (what's actually bound on the port)- `Last gateway error:` (common root cause when the process is alive but the port isn't listening)Fix:
```bashremoteclaw gateway install --force```
Run that from the same `--profile` / environment you want the service to use.Fix: stop the other instance, free the port, or run with `remoteclaw gateway --port <port>`.```json5{ gateway: { mode: "remote", remote: { url: "ws://gateway.tailnet:18789", token: "your-token", password: "your-password", }, },}```
Notes:
- `remoteclaw gateway` only starts when `gateway.mode` is `local` (or you pass the override flag).- The macOS app watches the config file and switches modes live when these values change.Facts (from code):
- The Control UI keeps the token in `sessionStorage` for the current browser tab session and selected gateway URL, so same-tab refreshes keep working without restoring long-lived localStorage token persistence.- On `AUTH_TOKEN_MISMATCH`, trusted clients can attempt one bounded retry with a cached device token when the gateway returns retry hints (`canRetryWithDeviceToken=true`, `recommendedNextStep=retry_with_device_token`).
Fix:
- Fastest: `remoteclaw dashboard` (prints + copies the dashboard URL, tries to open; shows SSH hint if headless).- If you don't have a token yet: `remoteclaw doctor --generate-gateway-token`.- If remote, tunnel first: `ssh -N -L 18789:127.0.0.1:18789 user@host` then open `http://127.0.0.1:18789/`.- Set `gateway.auth.token` (or `REMOTECLAW_GATEWAY_TOKEN`) on the gateway host.- In the Control UI settings, paste the same token.- If mismatch persists after the one retry, rotate/re-approve the paired device token: - `remoteclaw devices list` - `remoteclaw devices rotate --device <id> --role operator`- Still stuck? Run `remoteclaw status --all` and follow [Troubleshooting](/gateway/troubleshooting). See [Dashboard](/web/dashboard) for auth details.Fix:
- Start Tailscale on that host (so it has a 100.x address), or- Switch to `gateway.bind: "loopback"` / `"lan"`.
Note: `tailnet` is explicit. `auto` prefers loopback; use `gateway.bind: "tailnet"` when you want a tailnet-only bind.Yes, but you must isolate:
- `REMOTECLAW_CONFIG_PATH` (per-instance config)- `REMOTECLAW_STATE_DIR` (per-instance state)- `agents.defaults.workspace` (workspace isolation)- `gateway.port` (unique ports)
Quick setup (recommended):
- Use `remoteclaw --profile <name> ...` per instance (auto-creates `~/.remoteclaw-<name>`).- Set a unique `gateway.port` in each profile config (or pass `--port` for manual runs).- Install a per-profile service: `remoteclaw --profile <name> gateway install`.
Profiles also suffix service names (`org.remoteclaw.<profile>`; legacy `com.remoteclaw.*`, `remoteclaw-gateway-<profile>.service`, `RemoteClaw Gateway (<profile>)`).Full guide: [Multiple gateways](/gateway/multiple-gateways).Common causes:
- You opened the **HTTP** URL in a browser (`http://...`) instead of a WS client.- You used the wrong port or path.- A proxy or tunnel stripped auth headers or sent a non-Gateway request.
Quick fixes:
1. Use the WS URL: `ws://<host>:18789` (or `wss://...` if HTTPS).2. Don't open the WS port in a normal browser tab.3. If auth is on, include the token/password in the `connect` frame.
If you're using the CLI or TUI, the URL should look like:
```remoteclaw tui --url ws://<host>:18789 --token <token>```
Protocol details: [Gateway protocol](/gateway/protocol).Logging and debugging
```/tmp/remoteclaw/remoteclaw-YYYY-MM-DD.log```
You can set a stable path via `logging.file`. File log level is controlled by `logging.level`. Console verbosity is controlled by `--verbose` and `logging.consoleLevel`.
Fastest log tail:
```bashremoteclaw logs --follow```
Service/supervisor logs (when the gateway runs via launchd/systemd):
- macOS: `$REMOTECLAW_STATE_DIR/logs/gateway.log` and `gateway.err.log` (default: `~/.remoteclaw/logs/...`; profiles use `~/.remoteclaw-<profile>/logs/...`)- Linux: `journalctl --user -u remoteclaw-gateway[-<profile>].service -n 200 --no-pager`- Windows: `schtasks /Query /TN "RemoteClaw Gateway (<profile>)" /V /FO LIST`
See [Troubleshooting](/gateway/troubleshooting) for more.```bashremoteclaw gateway statusremoteclaw gateway restart```
If you run the gateway manually, `remoteclaw gateway --force` can reclaim the port. See [Gateway](/gateway).**1) WSL2 (recommended):** the Gateway runs inside Linux.
Open PowerShell, enter WSL, then restart:
```powershellwslremoteclaw gateway statusremoteclaw gateway restart```
If you never installed the service, start it in the foreground:
```bashremoteclaw gateway run```
**2) Native Windows (not recommended):** the Gateway runs directly in Windows.
Open PowerShell and run:
```powershellremoteclaw gateway statusremoteclaw gateway restart```
If you run it manually (no service), use:
```powershellremoteclaw gateway run```
Docs: [Windows (WSL2)](/platforms/windows), [Gateway service runbook](/gateway).```bashremoteclaw statusremoteclaw models statusremoteclaw channels statusremoteclaw logs --follow```
Common causes:
- Model auth not loaded on the **gateway host** (check `models status`).- Channel pairing/allowlist blocking replies (check channel config + logs).- WebChat/Dashboard is open without the right token.
If you are remote, confirm the tunnel/Tailscale connection is up and that theGateway WebSocket is reachable.
Docs: [Channels](/channels), [Troubleshooting](/gateway/troubleshooting), [Remote access](/gateway/remote).1. Is the Gateway running? `remoteclaw gateway status`2. Is the Gateway healthy? `remoteclaw status`3. Does the UI have the right token? `remoteclaw dashboard`4. If remote, is the tunnel/Tailscale link up?
Then tail logs:
```bashremoteclaw logs --follow```
Docs: [Dashboard](/web/dashboard), [Remote access](/gateway/remote), [Troubleshooting](/gateway/troubleshooting).```bashremoteclaw channels statusremoteclaw channels logs --channel telegram```
Then match the error:
- `BOT_COMMANDS_TOO_MUCH`: the Telegram menu has too many entries. RemoteClaw already trims to the Telegram limit and retries with fewer commands, but some menu entries still need to be dropped. Reduce plugin/skill/custom commands, or disable `channels.telegram.commands.native` if you do not need the menu.- `TypeError: fetch failed`, `Network request for 'setMyCommands' failed!`, or similar network errors: if you are on a VPS or behind a proxy, confirm outbound HTTPS is allowed and DNS works for `api.telegram.org`.
If the Gateway is remote, make sure you are looking at logs on the Gateway host.
Docs: [Telegram](/channels/telegram), [Channel troubleshooting](/channels/troubleshooting).```bashremoteclaw statusremoteclaw models statusremoteclaw logs --follow```
In the TUI, use `/status` to see the current state. If you expect replies in a chatchannel, make sure delivery is enabled (`/deliver on`).
Docs: [TUI](/web/tui), [Slash commands](/tools/slash-commands).```bashremoteclaw gateway stopremoteclaw gateway start```
This stops/starts the **supervised service** (launchd on macOS, systemd on Linux).Use this when the Gateway runs in the background as a daemon.
If you're running in the foreground, stop with Ctrl-C, then:
```bashremoteclaw gateway run```
Docs: [Gateway service runbook](/gateway).If you installed the service, use the gateway commands. Use `remoteclaw gateway` whenyou want a one-off, foreground run.Media and attachments
CLI sending:
```bashremoteclaw message send --target +15555550123 --message "Here you go" --media /path/to/file.png```
Also check:
- The target channel supports outbound media and isn't blocked by allowlists.- The file is within the provider's size limits (images are resized to max 2048px).
See [Images](/nodes/images).Security and access control
- Default behavior on DM-capable channels is **pairing**: - Unknown senders receive a pairing code; the bot does not process their message. - Approve with: `remoteclaw pairing approve --channel <channel> [--account <id>] <code>` - Pending requests are capped at **3 per channel**; check `remoteclaw pairing list --channel <channel> [--account <id>]` if a code didn't arrive.- Opening DMs publicly requires explicit opt-in (`dmPolicy: "open"` and allowlist `"*"`).
Run `remoteclaw doctor` to surface risky DM policies.The biggest risk is when tools are enabled: the model can be tricked intoexfiltrating context or calling tools on your behalf. Reduce the blast radius by:
- using a read-only or tool-disabled "reader" agent to summarize untrusted content- keeping `web_search` / `web_fetch` / `browser` off for tool-enabled agents- sandboxing and strict tool allowlists
Details: [Security](/gateway/security).Start small. Give access only to the tools and accounts you actually need, and expandlater if required.
Docs: [Security](/gateway/security), [Pairing](/channels/pairing).- Keep DMs in **pairing mode** or a tight allowlist.- Use a **separate number or account** if you want it to message on your behalf.- Let it draft, then **approve before sending**.
If you want to experiment, do it on a dedicated account and keep it isolated. See[Security](/gateway/security).Check pending requests:
```bashremoteclaw pairing list telegram```
If you want immediate access, allowlist your sender id or set `dmPolicy: "open"`for that account.Approve pairing with:
```bashremoteclaw pairing approve whatsapp <code>```
List pending requests:
```bashremoteclaw pairing list whatsapp```
Wizard phone number prompt: it's used to set your **allowlist/owner** so your own DMs are permitted. It's not used for auto-sending. If you run on your personal WhatsApp number, use that number and enable `channels.whatsapp.selfChatMode`.Chat commands, aborting tasks, and “it will not stop”
Fix in the chat where you see it:
```/verbose off/reasoning off```
If it is still noisy, check the session settings in the Control UI and set verboseto **inherit**. Also confirm you are not using a bot profile with `verboseDefault` setto `on` in config.
Docs: [Thinking and verbose](/tools/thinking), [Security](/gateway/security#reasoning-verbose-output-in-groups).```stopstop actionstop current actionstop runstop current runstop agentstop the agentstop remoteclawremoteclaw stopstop don't do anythingstop do not do anythingstop doing anythingplease stopstop pleaseabortescwaitexitinterrupt```
These are abort triggers (not slash commands).
For background processes (from the exec tool), you can ask the agent to run:
```process action:kill sessionId:XXX```
Slash commands overview: see [Slash commands](/tools/slash-commands).
Most commands must be sent as a **standalone** message that starts with `/`, but a few shortcuts (like `/status`) also work inline for allowlisted senders.Enable cross-provider messaging for the agent:
```json5{ agents: { defaults: { tools: { message: { crossContext: { allowAcrossProviders: true, marker: { enabled: true, prefix: "[from {channel}] " }, }, }, }, }, },}```
Restart the gateway after editing config. If you only want this for a singleagent, set it under `agents.list[].tools.message` instead.- `steer` - new messages redirect the current task- `followup` - run messages one at a time- `collect` - batch messages and reply once (default)- `steer-backlog` - steer now, then process backlog- `interrupt` - abort current run and start fresh
You can add options like `debounce:2s cap:25 drop:summarize` for followup modes.Miscellaneous
Still stuck? Ask in Discord or open a GitHub discussion.