OpenClaw installed, protected, and monitored in one command.
We set up OpenClaw + Shield in Docker on your machine, connect your models, and give you a live dashboard. Start free for 7 days, no DevOps required.
Single-command install
Install Docker, paste one line. Done in 60 seconds.
Shield PII protection
Emails, phones, API keys redacted before any LLM sees them.
Live performance dashboard
Every agent run, tool call, and redaction in real time.
Works on your OS
Mac (OrbStack), Windows (Docker Desktop), Linux, or VPS.
What you can build on Day 1
Pre-built workflows you deploy to your OpenClaw in minutes.
How It All Fits Together
One machine, full isolation, GPU-accelerated local models, cloud AI, and real-time monitoring.
Three Steps. One Session. Done.
No screen sharing. No ticket queues. Direct access to your OpenClaw instance.
Install Docker, Paste One Command
OrbStack on Mac (recommended) or Docker Desktop / Docker Engine. Copy the one-line bootstrap command from your Setup dashboard; it pulls the pre-built Zedly OpenClaw container, injects your session key, and opens a secure outbound tunnel — all in one go. docker stop ends the session.
Agent-Assisted Setup
LLM providers, model routing, plugin installation, gateway verification, and first agent test — all handled.
You're Live
Working OpenClaw instance with your preferred models, plugins installed, config backed up. Session log exported.
What Gets Configured
Everything you need to go from installed to productive.
LLM Provider Setup
API key configuration for OpenAI, Anthropic, Google, Groq, Ollama, or any provider OpenClaw supports. Verified working before we move on.
Model Routing
Configure which model handles which task. Frontier models for reasoning, budget models for extraction. Optimized for your workflow and cost target.
Shield Installation
Install and configure Zedly Shield for PII redaction, API key detection, content deny lists, and audit logging. Protection from the start.
First Agent Test Run
Your first agent runs successfully before the session ends. We verify tool calls, model responses, and output quality live.
Cron & Scheduling
Set up scheduled agent runs for recurring workflows. Cron configuration, log rotation, and error monitoring handled.
Config Backup
Your working configuration is backed up locally. If an OpenClaw update breaks something, you have a known-good state to restore.
Use Cases
Pre-built workflows you can deploy in minutes. Cold email outreach, lead enrichment, and more. Browse use cases
Docker + Local LLM
One-command install via Docker (OrbStack on Mac, Docker Desktop on Windows). Run multiple isolated instances — keep one stable, experiment on another. Install Ollama on bare metal for full GPU/Metal acceleration, and all containers share the local model automatically.
Outlook Attachment Drop (Mac)
Let OpenClaw process files emailed to your Outlook inbox. A one-command Mac installer adds a scheduled AppleScript that saves attachments from a named Outlook folder straight into your container — no cloud auth, no Azure app, no OpenClaw image rebuild. Works with Microsoft 365 work accounts.
Why we ship OpenClaw in a container
You can install OpenClaw bare-metal. We don't, and we don't recommend it, for six concrete reasons:
- Reproducible environment. Same image, same Node and OpenClaw versions, every time — no "works on my Mac" drift between machines or across reinstalls.
- Version pinning. Pin one instance to a stable image tag; experiment on another. See Why containers win for multi-instance setups for the long form.
- Resource limits. CPU and RAM caps are kernel-enforced per container, so a runaway agent can't starve the machine.
- OS-upgrade survival.
~/.openclawand~/.codexlive on the host as bind mounts. A macOS update that blows away/usr/localdoesn't touch your config or agents. - Clean uninstall.
docker rmplus deleting the bind directory. No orphaned launchd agents, cron jobs, or half-removed~/.openclawstate. - One atomic upgrade path. Rerun the bootstrap → new image, same bind-mounted config → done. See the upgrade FAQ for the full mechanics (and the one thing to avoid).
Your Machine, Your Control
A signed container, an outbound-only tunnel, and docker stop — you decide when access starts and stops.
Local Container
OpenClaw, Shield, and the tunnel all run inside a pinned, signed container pulled from GitHub Container Registry. Everything executes on your hardware — no files are copied to Zedly.
Per-Session Outbound Tunnel
The container initiates an outbound connection to Zedly — no inbound ports on your host. The gateway binds to localhost only, and each instance gets its own local port so multiple OpenClaws can run side-by-side. docker stop ends the session instantly.
Per-Session Keys + Full Audit Log
Each session generates a unique ed25519 SSH key that the bootstrap script injects into the container and that auto-revokes on the server when the session ends. Every command the setup agent runs is logged to an exportable per-session audit trail.
Nothing Installed On Your Host
No OpenClaw, Node, or OpenSSH server on your base OS. Remove the container cleanly at any time with docker rm — and your host OS is untouched.
Deploy Pre-Built Workflows
Once configured, launch guided use cases directly through your setup session. Each workflow includes PII protection via Zedly Shield, agent memory that learns over time, and step-by-step setup.
Intelligent Email Triage
Connect your Gmail or IMAP inbox. The agent scans, classifies, drafts replies in your writing style, sends Telegram alerts for VIPs, and compiles a daily digest. Gets smarter over weeks via QMD memory and Dreaming.
~25 min setupCold Email Outreach Engine
Full prospecting pipeline: find leads, verify emails with Hunter, draft personalized messages, authenticate your domain (SPF/DKIM/DMARC), and send through Google Workspace with a 5-agent OpenClaw workflow.
~30 min setupVibe Coding — DevOps from Your Phone
Ship code, review PRs, and deploy from Telegram with a 4-agent team (planner, coder, tester, reviewer). Shield auto-redacts secrets and gates destructive commands. QMD + Dreaming learns your codebase conventions over weeks.
~35 min setupMore coming soon
Lead enrichment, competitive monitoring, document processing, and more.
Pick Your Lane
Get OpenClaw configured in one session, then keep it protected, monitored, and stocked with vetted workflows - without hiring an MLOps engineer.
Solo
- Up to 2 OpenClaw instances
- Shield daemon + cloud dashboard
- 1 standard workflow included
- Config backups + update notifications
- Email support, 48h response
- Buy extra workflows a la carte ($29 each)
Consultant
- Up to 15 instances (+$5/mo per extra)
- Shield on every instance with policy sync
- 3 workflows included across all instances
- Multi-client fleet dashboard
- Unlimited self-serve installs and re-configs
- Priority email + chat, 24h response
Enterprise
- Up to 250 instances under one fleet dashboard
- Shield with custom policy packs
- All marketplace workflows included
- Dedicated setup engineer for rollout
- Dedicated support engineer, 4h SLA
- SSO, audit log export, SOC 2 artifacts
Frequently Asked Questions
curl … | bash on macOS/Linux, irm … | iex in PowerShell on Windows). That single command pulls the latest Zedly OpenClaw image, creates the container, injects the session's SSH key, and opens a secure outbound tunnel back to Zedly — if the container already exists it just reconnects. Once connected, open the localhost:<port> link shown in the dashboard for the OpenClaw gateway UI (each instance gets its own host port so you can run multiple OpenClaws side-by-side). The Zedly setup agent then configures LLM providers, installs plugins, and verifies your first agent through the Setup chat. No SSH server on your host, nothing permanent installed, and docker stop ends the session at any time.localhost on your machine — each instance gets its own local port (never exposed to the internet). Every command the setup agent runs is logged to a per-session audit trail you can export. docker stop or docker rm cleanly disconnects and removes the container. See “What can Zedly see on my Mac / PC through the tunnel?” below for the exact list of host folders the container can read.~/.codex/— your Codex OAuth token, so your ChatGPT Plus/Pro login persists across container rebuilds.~/.config/codex/— the newer XDG config path some Codex CLI versions use.~/.zedly/containers/<instance>/.openclaw/— your OpenClaw config, agent memory, Shield settings, workflow state, and credentials.
/Users/, /Applications/, system files, other Docker containers, files in any directory outside those three paths — is invisible to the container and therefore invisible to Zedly. If you want to give an OpenClaw agent access to another host folder (e.g. a project directory for code tasks, or an Outlook attachment drop folder), add a -v /path/on/host:/root/path-in-container bind-mount when you re-run the bootstrap command.
Rerun the one-command bootstrap from your Setup dashboard. It's the safest upgrade path — the one we test against each release, and the one that automatically preserves your bind-mounted ~/.openclaw config, API keys, Shield settings, and tunnel state.
Mechanically, the script does a docker pull plus recreate against your existing bind mounts (~/.zedly/containers/<instance>/.openclaw and ~/.codex), so native dependencies rebuild cleanly against the new image's Node toolchain.
Comfortable with Docker? Any docker pull + recreate that keeps your existing bind mounts intact will land you in the same place; the bootstrap just does that and also refreshes tunnel SSH keys, checks for config drift, and prints a clear success/failure line.
What to avoid, either way: running openclaw-level self-update flows or npm upgrade inside a running container. Native add-ons (e.g. node-llama-cpp) are compiled against that container's Node toolchain, and an in-place upgrade can leave you with a binary that fails at runtime without an obvious error — it's also a documented drift source from pre-2026.4.15 installs.
Want to try a new release safely? Spin up a second instance from the dashboard — same bootstrap, different name — upgrade one while the other stays pinned.
Cancel anytime. Your OpenClaw install is self-hosted — the Docker container, your config.json, any one-time workflow packs you've purchased, and locally-cached Shield policies stay on your machine and keep working.
When your billing period ends you'll keep the agent and lose the Zedly-hosted platform features: Shield cloud dashboard and fleet view, cross-instance policy sync, cloud config backups, the monthly setup-agent token allowance, workflow marketplace updates, and your support-tier SLA.
Resubscribe anytime — your existing config.json auto-reconnects to the cloud dashboard on the next handshake. Enterprise cancellation terms follow your contract. See Terms §6 for the full policy.
No. Solo runs a 14-day free trial with no credit card required. Sign up with your email, install OpenClaw in Docker, and use the dashboard, Shield, and one included workflow for the full trial.
We'll email you a couple days before the trial ends so you can upgrade without a gap. If you don't upgrade, your self-hosted OpenClaw keeps running on your machine (see Terms §6), but cloud features (marketplace, policy sync, backups, token allowance) pause until you resubscribe.
This is a launch-period policy — if we re-enable a card-on-file trial later, the CTA on this page updates automatically.
Questions or feedback?
Tell us what you need, what's missing, or what would make this a buy. We read everything.
Thanks — we got it.
We'll reply to your email within 1 business day. In the meantime, check out the setup assistant guide.
No spam. Straight to the team.
Get OpenClaw Running. Today.
Start a 7-day Solo trial or pick the plan that fits. Stop fighting config files.