Verified source commandA high-signal setup profile for first deployment and baseline configuration.
Install or setup path
These commands were verified from upstream source SKILL.md files. Copy them as-is, then continue with upstream onboarding instead of guessing the setup flow.
curl -fsSL https://openclaw.ai/install.sh | bash
openclaw onboard --install-daemon
The upstream setup skill lists this exact flow as the install method for a new OpenClaw deployment.
openclaw onboard --non-interactive \
--mode local --auth-choice apiKey \
--anthropic-api-key "$ANTHROPIC_API_KEY" \
--gateway-port 18789 --gateway-bind loopback \
--install-daemon --daemon-runtime node --skip-skills
Use this only after the base install when you need a scripted local setup with safe defaults and bundled skills disabled.
Use this profile for
Operators standing up OpenClaw on a laptop, homelab, or VPS who need a repeatable setup path without encouraging unsafe shortcuts.
Primary categoryOpenClaw
Source count2
OpenClaw relevantYes
What it does
This profile covers first-run installation, gateway/channel configuration, model wiring, and the handoff steps that keep an OpenClaw deployment understandable after day one.
Best for
Operators standing up OpenClaw on a laptop, homelab, or VPS who need a repeatable setup path without encouraging unsafe shortcuts.
Why it stands out
It is close to the real search demand around OpenClaw because setup, deployment, and troubleshooting intents dominate early-stage ecosystem usage.
Adopt this skill carefully
Return to the parent path
Move back to the category or hub instead of jumping to the homepage and losing context.
Cross-check the method
Review methodology and manuals before treating a public profile or copied command like production-ready guidance.
Use the surrounding workflow hub
When the profile belongs to OpenClaw operations, continue inside the OpenClaw cluster instead of starting over.
Safety notes
- Do not expose management or gateway surfaces directly to the public internet.
- Keep credentials scoped to the channels and models you actually use.
- Treat channel plugins and imported skills as untrusted until reviewed.
Related profiles
OpenClaw Security Hardening
Use this profile when OpenClaw is moving beyond local experiments and you need clear isolation, credential, and review controls.
OpenClaw Channel Operations
Use this profile when OpenClaw has to coordinate across messaging channels, browser actions, and everyday operator interventions.
Skill Safety Review
Use this profile when a team needs a repeatable way to screen public skills for hidden assumptions, risky permissions, or maintenance gaps.