Powered by HybridAI
HybridClaw gives Discord, Slack, Telegram, Teams, iMessage, WhatsApp, email, web, and terminal users the same memory, the same guardrails, and the same reliable execution flow.
npm install -g @hybridaione/hybridclaw
HybridClaw v0.12.5 adds versioned admin agent-file editing, a keyboard-driven TUI approval flow, safer config recovery, and channel reliability fixes for email, WhatsApp, and retry-aware transports.
/admin/agents now edits allowlisted bootstrap markdown files such as AGENTS.md, keeps saved revisions, and restores earlier versions without leaving the browser.
Pending approvals in hybridclaw tui now open a keyboard-driven picker with arrow-key navigation, quick-select numbers, and a resumable exit summary.
If config.json becomes invalid, interactive onboarding can restore the last known-good saved snapshot or roll back to a tracked revision before setup continues.
The built-in email transport now seeds a missing mailbox cursor from the current head so old inbox mail is not replayed as new traffic on first startup.
HybridClaw disables Baileys init queries that can trigger intermittent 400/bad-request failures during WhatsApp startup and pairing.
Retry-capable channel transports now honor server-provided Retry-After delays and reject invalid retry values early instead of silently retrying with bad timing.
HybridAI gives HybridClaw a strong enterprise foundation: security, compliance alignment, and document-grounded intelligence.
Each bot can have its own focus, tone, and knowledge. Use one for deep research, one for support, and one for day-to-day team productivity.
Built for teams that need trustworthy controls and secure operations by default.
Designed for real business workflows, team governance, and operational reliability.
Strong fit for organizations prioritizing EU-centric infrastructure and data posture.
Supports privacy-conscious deployment strategies and compliance-driven teams.
Run HybridClaw in a managed, secured cloud container — no local setup, always-on, ready in seconds.
Ground answers in your organization’s knowledge for higher relevance and confidence.
Turn internal documents into practical, searchable context your digital coworker can use.
Blend workspace memory, semantic recall, and typed knowledge-graph relations with HybridAI grounding to produce actionable answers.
Run useful actions behind trust acceptance, runtime guardrails, sandbox controls, and instruction integrity checks so automation stays controlled.
Share one assistant behavior across Discord, Slack, Telegram, Teams, iMessage, WhatsApp, email, web, and terminal without managing separate bot personalities.
Persist and compact long-running conversations with canonical session keys, per-channel DM isolation by default, optional linked-identity continuity, and configurable token-budget controls.
Schedule recurring or one-shot tasks with cron/interval/at semantics, and deliver proactive output to channels or webhooks.
Track status, sessions, usage/cost aggregates, tamper-evident audit history, approval decisions, and observability export health from one runtime surface.
Run on your own machine with the CLI, or launch a fully managed cloud instance in a secured Docker container — no infrastructure to maintain.
| Area | HybridClaw | OpenClaw | NanoClaw | PicoClaw |
|---|---|---|---|---|
| Onboarding | Explicit trust acceptance | Strong default flow | Quick startup flow | Minimal setup path |
| Security & Trust | Trust-first policy posture + encrypted runtime secrets + gateway-side auth injection | Solid baseline controls | Lean safeguards | Minimal guardrails |
| Secret Storage | Encrypted-at-rest named secret store with separate master key | Project-dependent | Lightweight local handling | Minimal local secret layer |
| Runtime Control | Live config updates + SecretRefs + URL auth routes | Setup-dependent tuning | Simple control surface | Minimal controls |
| Digital Coworker Feel | Memory + proactive follow-up | Strong continuity model | Lightweight continuity | Short-turn focus |
| Enterprise Readiness | Hash-chained audit plus local instruction integrity controls | Strong base, extended per team | Lean core + add-ons | Minimal footprint strategy |
| Deployment Options | Local CLI + managed cloud containers | Self-hosted only | Self-hosted only | Self-hosted only |
| Cross-Channel Consistency | One assistant brain across channels | Often one primary channel | Light multi-channel support | Mostly single-channel simplicity |
| Feature | Hermes Agent | OpenClaw | HybridClaw |
|---|---|---|---|
| Memory & Continuity | |||
| Memory system | Markdown files | Markdown files + vector search | Markdown files + SQLite semantic vectors |
| Memory size | Bounded (2.2k + 1.4k chars) | Growing files + vector index | Bounded prompt + SQLite |
| Memory nudges | Every 10 user turns | None | Heartbeat + flush nudges |
| Memory flush | Dedicated flush turn | Pre-compaction flush | Flush before compaction |
| Daily memory layer | No daily digest | Daily logs + tool recall | Daily digest to MEMORY.md |
| Knowledge graph memory | No graph memory | No graph memory | Entity/relation graph |
| Session history search | FTS5 + summaries | Experimental | Summaries + optional QMD retrieval |
| Cross-session user modeling | Honcho model | File-based only | Linked identities + memory backends |
| Session key continuity | Cross-platform mapping | Channel/topic keys | Canonical keys + linked IDs |
| Cache-stable memory | Frozen snapshots | Per-turn file injection | Injected memory + saved summaries |
| Memory injection security | Prompt-injection scanner | None | Prompt sanitization + cited recall |
| Skills & Learning | |||
| Skill system | 54 bundled + Skills Hub | 53 bundled + ClawHub | 33 bundled + 7 import sources |
| Skill standard | agentskills.io | OpenClaw-only | OpenClaw/CLAUDE SKILL.md |
| Agent package format | None | None | Portable .claw bundles |
| Skill prompt loading | Slash skills as user messages | Auto-load; hidden off lists | Always-on, summary, hidden |
| Skill security scanning | Scanner + quarantine | Code scanner on install | Trust-aware skill scan |
| Autonomous skill creation | Nudged every 15 iterations | User-triggered only | Guarded skill proposals |
| Skill self-improvement | Live patching | Static | Observe, review, apply/reject |
| Adaptive skill governance | Learning loop, no staged rollback | None found | Metrics + staged rollback |
HybridClaw keeps one shared assistant brain across channels while running actions with safety guardrails.
HybridClaw is optimized for quick responses, even when your team uses it all day.
Clear runtime surfaces make it easier to monitor, maintain, and trust in production.
Guardrails are built in so teams can unlock automation without sacrificing control.
Structured prompting keeps behavior stable, reliable, and aligned with your standards.
For technical teams who want to understand how HybridClaw is built and operated.
Node.js gateway with persistent session state, scheduler metadata (`name`, `description`, `nextRunAt`), and HTTP endpoints for status, chat, and commands.
Append-only wire logs are SHA-256 hash-chained for tamper-evident immutability, with searchable events, verification, and approval history.
Gateway start/restart accepts --log-requests to persist best-effort redacted prompts, responses, and tool payloads in SQLite request_log for operator debugging. Typed browser input is always redacted.
hybridclaw eval and local /eval can point benchmark harnesses at the loopback OpenAI-compatible gateway, with managed locomo, tau2, and native terminal-bench-2.0 runs, detached logs, retrieval sweeps, and progress summaries under ~/.hybridclaw/data/evals/.
Trust-model acceptance is required during onboarding, execution uses container or host sandbox modes with runtime guardrails, user-directed browser auth-flow testing is supported, and TUI blocks when runtime instruction copies drift from installed defaults.
Structured hook pipeline: bootstrap, memory, safety, and proactivity, plus history/token budgets, current-turn media uploads, and inline @file/@folder/@diff/@staged/@git/@url context references for predictable grounded prompts.
Typed config.json with defaults, validation, hot reload, SecretRef-backed credential surfaces, and isolation controls. Runtime secrets live in an encrypted ~/.hybridclaw/credentials.json store with a separate master-key source.
Persistent workspace memory, nightly dream consolidation with startup catch-up, semantic memory, typed entity/relation knowledge graph, canonical transport session keys, linked-identity continuity scopes, and long-session compaction keep context coherent across Discord, Slack, Telegram, Teams, iMessage, WhatsApp, email, web, and terminal channels.
Schema evolution uses lightweight PRAGMA user_version migrations with forward-version guards, and runtime enables journal_mode=WAL + busy_timeout=5000 for safer concurrent reads.
Per-turn usage events are aggregated by day/month, model, and agent via usage commands, and sessions can be exported as JSONL snapshots (export session [sessionId]) for debugging.
Edit-in-place streaming, chunk-safe long messages, phase-aware typing/reactions, dynamic self-presence, adaptive debounce/rate limits, and humanized pacing (night/weekend slowdown, exchange cooldown scaling, selective silence, read-without-reply reactions, reconnect staggering).
scheduler.jobs[] supports cron/every/at schedules plus immediate one_shot jobs, with agent_turn or system_event actions and delivery to fixed channels, last-active channels, or webhooks. Metadata persists atomically, one-shot runs keep review state, and jobs auto-disable after repeated failures.
HybridClaw ships with 35 bundled skills, including the gog Google Workspace CLI workflow, the manim-video animation workflow, and the excalidraw diagramming workflow, category-aware catalog and admin authoring flows, and OpenClaw/CLAUDE-compatible SKILL.md discovery with prompt embedding modes (always/summary/hidden), eligibility checks, and trust-aware security scanning. Community imports support packaged official/<skill> skills, skills-sh, clawhub, lobehub, claude-marketplace, well-known, and explicit GitHub repo/path sources via hybridclaw skill import or /skill import.
hybridclaw agent export|inspect|install manages portable .claw archives that can bundle an agent workspace plus selected workspace skills and home plugins for backup, transfer, or bootstrap workflows. Legacy pack|unpack aliases still work.
hybridclaw browser login|status|reset manages a persistent Chromium profile under the runtime data directory so browser automation can reuse cookies and local storage for approved authenticated flows.
Command-driven persona switching via /personality updates a managed block in SOUL.md (Name, Definition, Rules) so style remains persistent across sessions without always-on prompt bloat.
Autonomous iteration can run beyond a single turn via proactive.ralph.maxIterations, and operators can control it live with ralph on|off|set <n>|info without waiting for idle recycle.
Discord replies can include pending guild-history context, participant alias memory, @name mention-to-ID rewrites, and optional per-channel presence snapshots for better grounded responses.
Prompt assembly now injects runtime metadata (version, UTC date, model/default model, chatbot/channel/guild IDs, node/OS/host/workspace) so answers stay aligned to the active runtime state.
Read-first routing prefers web_fetch for static retrieval, emits escalation hints on JS/app-shell/bot-blocked pages, and guides browser extraction with full snapshots for dynamic content.
HybridClaw supports local plugins with typed manifests, plugin tools, memory layers, prompt hooks, lifecycle hooks, and exported SDK types. Operators can auto-discover plugins from home or project directories, manage them with hybridclaw plugin list|config|install|reinstall|uninstall, hot-reload them with /plugin reload, and install repo-shipped plugins such as gbrain, honcho-memory, mempalace-memory, qmd-memory, and brevo-email for external retrieval, memory recall, and per-agent email routing.
Shared assistant behavior across Discord, Slack, Telegram, Teams, iMessage, WhatsApp, email, web, and terminal, plus bundled skills for office docs, GitHub, Notion, Stripe, WordPress, Google Workspace, Discord, email, and Apple workflows.
Structured audit events are pushed to HybridAI observability ingest with cursor-based delivery, auto-managed bot-scoped ingest tokens, and per-turn token usage metrics.
Runtime supports start, stop, and restart flows with graceful shutdown handling, explicit sandbox overrides (--sandbox=container|host), status reporting for both managed and unmanaged gateway processes, and safer startup fallback when Discord token configuration is invalid.
Embedded browser-based admin at /admin with Dashboard, Terminal, Gateway, Sessions, Jobs, Bindings, Models, Scheduler, MCP, Audit, Skills, Plugins, Tools, and Config pages. Use /admin/terminal for a live PTY session, pair /chat with web conversations, and keep /agents open for workspace dashboards. When WEB_API_TOKEN is set, the auth callback can store it in browser storage and redirect to a safe relative destination without leaving the token in the URL.
Commands across CLI, TUI, Discord, and gateway surfaces for config, auth, plugins, skills, diagnostics, and debugging.
From reading content to taking action, HybridClaw can complete real workflows end-to-end.
Bootstrap files give your agent identity, memory, and purpose. Each agent gets its own persistent workspace, and sessions can bind or switch independently.
| File | Purpose |
|---|---|
| SOUL.md | Personality and behavior |
| IDENTITY.md | Name, avatar, style |
| USER.md | Info about the user |
| MEMORY.md | Persistent memory across sessions |
| TOOLS.md | Tool usage notes and tips |
| HEARTBEAT.md | Tasks to check during heartbeat |
| BOOT.md | Startup instructions |
| BOOTSTRAP.md | One-time onboarding (removed after first run) |
| OPENING.md | First proactive message for a fresh session |
| AGENTS.md | Conventions and guidelines |
Choose your deployment: run locally on your machine or spin up a managed cloud instance.
npm install -g @hybridaione/hybridclaw
hybridclaw onboarding to accept trust model and generate config.json.
hybridclaw gateway to launch the core service with your configured bot/model. Use hybridclaw gateway start --sandbox=host when HybridClaw itself already runs inside a container.
Use Discord, the built-in web chat, or run hybridclaw tui for a terminal-native chat experience with a startup banner, an interactive approval picker, and an exit summary with a ready-to-run resume command. Web chat accepts uploads and pasted files, and TUI can queue a copied file or clipboard image with /paste or Ctrl-V.
Run hybridclaw doctor to check runtime, auth, providers, Docker, channels, and disk state. Add --fix when a safe remediation is available.
# 60-second flow npm install -g @hybridaione/hybridclaw hybridclaw onboarding hybridclaw gateway hybridclaw tui
Sign up at hybridai.one to create your free HybridAI account.
Choose a paid plan or contact us via Discord or support@hybridai.one for a voucher code.
Start your personal HybridClaw in the cloud — running in a secured Docker container, fully managed and always-on.
Connect via Discord, the web chat, or any supported interface. Your cloud instance is ready to go — no local setup needed.
hybridclaw doctor. It checks runtime, gateway, config, credentials, database, providers, Docker, channels, skills, security, and disk state in parallel. Use hybridclaw doctor --fix to apply safe remediations where supported, or --json for CI-friendly output. When the environment checks pass but a specific turn still needs inspection, start or restart the gateway with --log-requests to persist best-effort redacted prompts, responses, and tool payloads in SQLite request_log.config.json with policy version and timestamp so operators can prove security acknowledgement. For CI or other headless shells, HYBRIDCLAW_ACCEPT_TRUST=true can persist that acceptance automatically before credential checks. Technical runtime controls are documented separately in SECURITY.md.config.json and runtime secrets live in an encrypted ~/.hybridclaw/credentials.json store. HybridClaw reads the master key from HYBRIDCLAW_MASTER_KEY, /run/secrets/hybridclaw_master_key, or a local owner-only credentials.master.key. If .env exists in the current working directory, supported secrets are imported once for compatibility. If you need the whole runtime state elsewhere, set HYBRIDCLAW_DATA_DIR to an absolute path./secret set <NAME> <VALUE>, then either reference it in a prompt with <secret:NAME> or bind it to a URL prefix with /secret route add. HybridClaw injects the real header in the gateway-side http_request path and persists redacted tool-call arguments instead of the plaintext secret.no-new-privileges, PID limits, and a deny-list of dangerous command patterns. When HybridClaw itself already runs inside a container, operators can switch to host sandbox mode to avoid Docker-in-Docker, trading container isolation for workspace fencing and command guardrails.hybridclaw browser login to open a headed Chromium profile, sign in manually, then close the browser. HybridClaw stores that profile under the runtime data directory and reuses it for later browser automation, including cookie and local-storage based sessions.web_fetch for static/read-only retrieval. HybridClaw escalates to browser automation for JavaScript-heavy apps, auth-gated flows, interaction steps, or when web_fetch reports hints like javascript_required, spa_shell_only, empty_extraction, boilerplate_only, or bot_blocked. Browser snapshots also mark pointer- and click-handler-driven custom controls more reliably, which helps the agent interact with modern app-style UIs./paste or Ctrl-V. You can also add inline context references such as @file:path[:start-end], @folder:path, @diff, @staged, @git:<count>, and @url:https://example.com/spec so HybridClaw can attach the relevant context directly to the prompt.~/.hybridclaw/plugins/ and project-local .hybridclaw/plugins/ directories, and you can manage them with hybridclaw plugin list, config, install, reinstall, uninstall, and /plugin reload.hybridclaw agent export creates a portable .claw archive, inspect validates it without extracting, and install restores the agent on another machine. Archives can also bundle selected workspace skills and home plugins. Legacy pack and unpack aliases still work.hybridclaw audit verify <sessionId> to validate integrity, and hybridclaw audit approvals --denied to review denied actions.SECURITY.md and TRUST_MODEL.md under ~/.hybridclaw/instructions/. TUI checks them before startup. Use hybridclaw audit instructions to review drift and hybridclaw audit instructions --sync to restore them from installed sources. Sync actions are audit logged.hybridclaw tui, use the built-in web chat, or connect Slack, Telegram, Microsoft Teams, iMessage, WhatsApp, or email. The same assistant behavior and context model is shared across supported interfaces, and gateway startup stays available even if one transport is temporarily misconfigured./agent switch. You can control reply activation per channel with /channel-mode and guild policy via /channel-policy.allowlist using /channel-policy policy:allowlist, then run /channel-mode mode:free in the one channel you want active. Leave other channels unlisted (or set them to off).schedule add) and config-backed scheduler.jobs[]. Both support cron, one-shot at, and interval semantics, and config jobs also support immediate one_shot runs. Config jobs can use agent_turn/system_event actions plus channel/last-channel/webhook delivery, with persisted metadata, review-state tracking for one-shot jobs, and auto-disable after repeated failures.openai-codex/ prefix), OpenRouter models (via openrouter/ prefix), Hugging Face router models (via huggingface/ prefix), and local backends including Ollama, LM Studio, llama.cpp, and vLLM. Use model list to browse available models and switch per channel or session at any time.hybridclaw migrate openclaw --dry-run or hybridclaw migrate hermes --dry-run to preview the compatible workspace files, config values, model settings, and optional secrets that can be imported into a HybridClaw agent. Add --agent <id> to target a different agent and --migrate-secrets when you want compatible secrets moved into the encrypted runtime store.memory/YYYY-MM-DD.md) and curates long-term insights into MEMORY.md. By default, direct-message continuity is isolated per channel kind and peer. Operators can opt into linked-identity continuity when verified aliases should share one main session scope. Before session compaction, a dedicated flush turn ensures durable notes are persisted. These files plus SOUL.md are injected into every request./personality (or /personality list) to view profiles, /personality <name> to activate one, and /personality reset to go back to default. HybridClaw persists the active persona in SOUL.md as a managed block with Name, Definition, and Rules./admin with pages for Dashboard, Terminal, Gateway, Sessions, Jobs, Bindings, Models, Scheduler, MCP, Audit, Skills, Plugins, Tools, and Config. The Skills page can create local skills from a form or ZIP upload and review adaptive-skill amendments. There is also a live browser terminal at /admin/terminal, a web chat at /chat, and an agent/session dashboard at /agents. When WEB_API_TOKEN is unset, localhost access opens without a login prompt. When it is set, the auth callback can store the token in browser storage and redirect to a safe relative path after login.SKILL.md frontmatter, including always, requires, and metadata fields. Skills can be loaded from workspace, project .agents/skills, personal (~/.codex/~/.claude/~/.agents), bundled, or enterprise extra directories; higher-priority tiers override lower ones. Community skills can also be imported from packaged official/<skill> sources, skills-sh, clawhub, lobehub, claude-marketplace, well-known, and explicit GitHub repo/path refs. Trust-aware scanning blocks risky personal/community skills while allowing vetted bundled skills.