Step 1
$brew install joshavant/tap/clawbox
$clawbox image build && clawbox up
Official Project Brief
Clawbox is our command-line platform for deploying and managing OpenClaw-ready macOS virtual machines. Clawbox standardizes setup for regular users, while Clawbox developer mode supports concurrent multi-VM workflows with synchronized code and payload folders, based on the documented Python, Ansible, Packer, Mutagen, and Tart stack.
Step 1
$brew install joshavant/tap/clawbox
$clawbox image build && clawbox up
Step 2
$openclaw onboard --install-daemon
Clawbox is designed to provide a practical and repeatable path for running OpenClaw in isolated macOS environments. The platform combines VM lifecycle operations, dependency provisioning, and image workflows into one CLI surface so that operational setup does not depend on manual, host-specific configuration.
This snapshot is derived from the supplied joshavant_clawbox调研报告 (1).docx and reflects the repository status captured on February 18, 2026.
| Field | Documented Value |
|---|---|
| Repository | github.com/joshavant/clawbox |
| Author | Josh Avant (@joshavant) |
| Public Release Date | February 14, 2026 |
| Documented Version | v1.0.2 (dated February 14, 2026) |
| Stars / Forks | 63 stars / 7 forks (as documented) |
| License | MIT |
| Primary Language Mix | Python 94% / Shell 4.4% / Jinja 1.1% |
| CI Status | GitHub Actions passing; report also notes Cirrus CI in the delivery pipeline |
| Install Command | brew install joshavant/tap/clawbox |
One-command deployment of preconfigured OpenClaw-ready macOS virtual machines.
A simplified setup path for users who need an operational OpenClaw environment quickly.
Parallel VM workflows with synchronized host source and workload directories for iteration speed.
Documented support for optional dependency provisioning such as Tailscale, Playwright, and signal-cli.
up, down, recreate, delete, status, and ip.image init, image build, and image rebuild.The documented standard flow installs Clawbox, builds a base image, starts a VM, then runs OpenClaw onboarding inside the VM.
Developer mode mounts OpenClaw source and payload directories into VMs, enabling host-to-VM synchronization and faster branch-level testing loops.
Single VM Developer Example
clawbox up --developer \
--openclaw-source ~/Developer/openclaw-1 \
--openclaw-payload ~/Developer/openclaw-payloads/clawbox-1
Dual VM Concurrent Example
clawbox up --developer --number 1 \
--openclaw-source ~/Developer/openclaw-1 \
--openclaw-payload ~/Developer/openclaw-payloads/clawbox-1
clawbox up --developer --number 2 \
--openclaw-source ~/Developer/openclaw-2 \
--openclaw-payload ~/Developer/openclaw-payloads/clawbox-2
Documented operational constraint: Apple EULA allows up to two concurrent virtualized macOS instances.
The documented codebase structure centers on Python CLI orchestration, with dedicated modules for VM control, synchronization, configuration state, and image operations.
| Component | Role in Clawbox |
|---|---|
cli.py |
User-facing command entrypoint and argument parsing. |
tart.py |
Interaction layer for creating, starting, stopping, and deleting VMs through Tart. |
orchestrator.py |
Coordinates lifecycle phases, including image preparation and configuration execution. |
mutagen.py |
Manages host-VM synchronization sessions in developer workflows. |
ansible_exec.py |
Executes Ansible tasks for inside-VM automation and service setup. |
image.py |
Handles image initialization, build, and rebuild operations. |
The ansible/ structure uses playbooks, roles, inventory, and group variables to automate inside-VM configuration, dependency installation, and system setup for OpenClaw operation.
The documented packer/macos-base.pkr.hcl blueprint defines a repeatable base image workflow so each new VM starts from a consistent macOS foundation.
| Flag | Purpose | Note from Report |
|---|---|---|
--add-playwright-provisioning |
Installs browser automation dependencies and major browsers | Positioned as required for browser-oriented OpenClaw skills |
--add-tailscale-provisioning |
Enables private networking and remote VM access | Manual authorization is still required after installation |
--add-signal-cli-provisioning |
Adds Signal channel capability | Documented to support payload synchronization in developer setups |
The provided report frames Clawbox as an engineering response to OpenClaw permission-boundary concerns: instead of only patching application behavior, Clawbox isolates execution inside a VM boundary.
| Native OpenClaw Risk (Documented) | Clawbox VM Isolation Effect (Documented) |
|---|---|
| Agent can reach host-level secrets and credentials | Agent scope is restricted to the VM file system by design |
| Arbitrary shell execution may affect host environment | Shell impact is constrained to the VM runtime context |
| Compromise of one instance can spread across shared host state | Each VM is isolated; per-instance data and payloads remain separated |
| Prompt-injection outcomes can escalate to full-machine loss | Worst-case destruction primarily affects the VM disk, not the host OS |
| Limitation | Documented Impact | Severity in Report |
|---|---|---|
| macOS + Apple Silicon dependency | Excludes Linux and Windows users entirely | High |
| Apple concurrency license boundary | Up to two concurrent virtualized macOS instances | Medium |
| Initial image build time and download size | First-run setup can take minutes and large downloads | Low |
| Small community footprint | Lower bus-factor resilience and uncertain long-term maintenance | Medium |
| In-VM OpenClaw risk still exists | Isolation limits spread, but does not eliminate in-VM misuse risk | Medium |
Name clarification from the report: joshavant/clawbox is unrelated to the similarly named hardware project (openclawhardware.dev) and filesystem SaaS (withclawbox.com).
Clawbox is a command-line platform that deploys and manages OpenClaw-ready macOS virtual machines, with a focus on repeatable setup and operational consistency.
Standard mode is designed for straightforward OpenClaw setup. Developer mode supports concurrent multi-VM workflows plus synchronized host-to-VM source and payload folders.
The documented stack includes Python, Ansible, Packer, Mutagen, and Tart to cover CLI orchestration, VM automation, image building, synchronization, and VM operations.
Lifecycle operations include up, down, recreate, delete, status, and ip. Image operations include image init, image build, and image rebuild.
In-VM setup is automated through Ansible playbooks, roles, inventory, and group variables, while Packer configuration is used to create standardized macOS base images.
Clawbox provides environment isolation, dependency automation, and synchronized development workflows, helping reduce host conflicts and improving reproducibility for OpenClaw projects.
To align with transparent documentation standards, this page summarizes only findings present in the supplied source files: Clawbox 项目深度调研报告.md and joshavant_clawbox调研报告 (1).docx, plus their cited references. No unsupported feature claims are introduced.