Skip to content

netclaw init

First-run wizard. Configures your provider, security policy, channels, identity, skills, and network exposure in one pass, then starts the daemon.

Terminal window
netclaw init
FlagDescriptionDefault
(none)Launch the interactive wizard

Have these ready before starting:

No other dependencies needed.

The wizard adapts to your choices — steps get skipped based on your security posture and feature selections.

Pick a provider, enter credentials, select a model.

Provider selection list

Netclaw supports many providers out of the box — pick one to start with here, and use netclaw provider to add more later. Self-hosted providers like Ollama need an endpoint URL:

Endpoint configuration

Ollama provider configuration

Once credentials pass a connectivity check, you pick a default model:

Model selection

Security posture selection

PostureTrust LevelShell Access
PersonalSingle-user, high trustEnabled with approval gates
TeamMulti-user, medium trustOff by default
PublicUntrusted users, low trustOff

Every new shell command needs your sign-off the first time. You can override per-channel later.

Enable or disable memory, search, skills, scheduling, sub-agents, and webhooks. Skipped in Personal mode (everything on by default).

Channel picker

Slack, Discord, or both. Each one opens a sub-step for tokens and workspace config.

Slack needs a Bot Token (xoxb-...) and App Token (xapp-...) for Socket Mode. It tests connectivity before moving on.

Search toggle

Enable web search so netclaw can pull live results during conversations.

Browser automation toggle

Activate browser automation — page fetching, screenshots, form interaction.

Owner/user identity

The owner identity determines who gets operator-level access.

Agent name

Personality style

Timezone

Webhook URL

Workspace configuration

Give your agent a name, pick a personality style (shapes tone in chat), set a timezone for scheduling, and optionally wire up a webhook URL for outbound notifications. The screenshots walk you through each field.

Custom skills path

Point to a local directory with custom skill definitions.

External skills

Add remote skill servers or additional skill packages.

Skill feeds

Subscribe to skill feeds — curated skill collections from the community or your org.

Exposure mode selection

ModeReachabilityRequires
localLoopback only (this machine)Nothing
tailscale-serveYour Tailscale tailnettailscaled running
tailscale-funnelPublic internet via Tailscaletailscaled running
cloudflare-tunnelPublic internet via Cloudflare Tunnelcloudflared running

The internet-facing modes (tailscale-funnel, cloudflare-tunnel) make you type an explicit confirmation. They’re not kidding about the warning.

Webhook configuration

If you enabled webhooks, you’ll configure inbound routes here.

Health check running

Validates config files, tests provider connectivity, verifies channel tokens, checks tunnel prerequisites.

Health check complete

All green? The daemon starts automatically.

If something fails, the wizard tells you which check broke and suggests running netclaw doctor for detailed diagnostics.

FilePurpose
~/.netclaw/config/netclaw.jsonMain configuration (includes security posture)
~/.netclaw/config/secrets.jsonEncrypted credentials
~/.netclaw/identity/Agent identity and personality
Terminal window
# Verify everything is healthy
netclaw doctor
# Check daemon status
netclaw status
# Start your first conversation
netclaw chat