Verified source commandA high-signal setup profile for first deployment and baseline configuration.

Install or setup path

These commands were verified from upstream source SKILL.md files. Copy them as-is, then continue with upstream onboarding instead of guessing the setup flow.

Quick install

Verified 2026-03-11 from Aznatkoiny openclaw-setup SKILL.md

curl -fsSL https://openclaw.ai/install.sh | bash
openclaw onboard --install-daemon

The upstream setup skill lists this exact flow as the install method for a new OpenClaw deployment.

Non-interactive local setup

Verified 2026-03-11 from Aznatkoiny openclaw-setup SKILL.md

openclaw onboard --non-interactive \
  --mode local --auth-choice apiKey \
  --anthropic-api-key "$ANTHROPIC_API_KEY" \
  --gateway-port 18789 --gateway-bind loopback \
  --install-daemon --daemon-runtime node --skip-skills

Use this only after the base install when you need a scripted local setup with safe defaults and bundled skills disabled.

Use this profile for

Operators standing up OpenClaw on a laptop, homelab, or VPS who need a repeatable setup path without encouraging unsafe shortcuts.

Primary categoryOpenClaw
Source count2
OpenClaw relevantYes

What it does

This profile covers first-run installation, gateway/channel configuration, model wiring, and the handoff steps that keep an OpenClaw deployment understandable after day one.

Best for

Operators standing up OpenClaw on a laptop, homelab, or VPS who need a repeatable setup path without encouraging unsafe shortcuts.

Why it stands out

It is close to the real search demand around OpenClaw because setup, deployment, and troubleshooting intents dominate early-stage ecosystem usage.

Adopt this skill carefully

Return to the parent path

Move back to the category or hub instead of jumping to the homepage and losing context.

Cross-check the method

Review methodology and manuals before treating a public profile or copied command like production-ready guidance.

Use the surrounding workflow hub

When the profile belongs to OpenClaw operations, continue inside the OpenClaw cluster instead of starting over.

Safety notes

  • Do not expose management or gateway surfaces directly to the public internet.
  • Keep credentials scoped to the channels and models you actually use.
  • Treat channel plugins and imported skills as untrusted until reviewed.

Source context

Generated from SkillsMP discovery and upstream GitHub SKILL.md verification. WhichAITools uses this catalog as source evidence, then layers editorial summaries and safety notes on top.

OpenClaw profile on SkillsMPOpenClaw setup profile on SkillsMP

Related profiles

OpenClaw Security Hardening

Use this profile when OpenClaw is moving beyond local experiments and you need clear isolation, credential, and review controls.

OpenClaw Channel Operations

Use this profile when OpenClaw has to coordinate across messaging channels, browser actions, and everyday operator interventions.

Skill Safety Review

Use this profile when a team needs a repeatable way to screen public skills for hidden assumptions, risky permissions, or maintenance gaps.