Network Policies
MemantoClaw runs with a deny-by-default network policy. The sandbox can only reach endpoints that are explicitly allowed. Any request to an unlisted destination is intercepted by OpenShell.Baseline Policy
The baseline policy is defined inmemantoclaw-blueprint/policies/openclaw-sandbox.yaml.
- Filesystem:
/sandbox,/tmp,/dev/nullare Read-write./usr,/lib,/proc,/app,/etcare Read-only. - Network: Endpoints like
openclaw.ai:443,docs.openclaw.ai:443,registry.npmjs.org:443are allowed. - Inference: The baseline policy allows only the
localinference route.
github preset if needed.
Operator Approval Flow
When the agent attempts to reach an unlisted endpoint, OpenShell intercepts the request interactively.- Open the TUI:
openshell term - Trigger a blocked request (the agent tries to reach an unknown host).
- The TUI displays the Host, Port, Binary, and HTTP method of the request.
- Approve to add the endpoint for the current session, or Deny to keep it blocked.
Customize the Sandbox Network Policy
Static Changes
Editmemantoclaw-blueprint/policies/openclaw-sandbox.yaml. Each entry defines endpoints, binaries, and rules (methods). Then re-run:
Dynamic Changes
Create a YAML policy file and apply it to a running sandbox instantly:Policy Presets
MemantoClaw ships preset policy files for common integrations (e.g.,github, npm, pypi, discord, slack). To apply a preset to a running sandbox:
For complete, unabridged technical details on this topic, refer to the official NVIDIA NemoClaw Documentation. Portions of this guide are summarized and adapted from NVIDIA Corporation (Copyright © 2026), licensed under the Apache License, Version 2.0.