MemantoClaw
A secure, context-aware reference stack for autonomous agents.
Run OpenClaw inside OpenShell, powered by Memanto for long-term memory. Unlock routed inference and instant recall with one MOORCHEH_API_KEY.
memantoclawA hardened bridge between your machine
and an agent you can trust.
OpenClaw is powerful, but it's also a process that wants to read your files, spawn subshells, and call out to the internet. MemantoClaw inherits four independent enforcement layers from OpenShell — each with its own scope and reload cadence.
Autonomy, locked down. Memory, built in.
MemantoClaw isn't a new agent framework. It's a curated stack of three best-in-class technologies, glued together with a single key and a thoughtful host bridge.
- CLI + TUI runtimes
- Pluggable model providers
- Session-aware loops
- Network egress allowlist
- Filesystem jail
- Seccomp + namespace boundary
- Context across sessions
- Information-theoretic search
- Instant ingestion
We took NVIDIA's sandbox framework — containerization, network egress filtering, OpenShell isolation — and supercharged it with the Moorcheh memory stack.
Solves agent amnesia
better than a vector DB.
Most stacks bolt on a vector database and call it a memory layer. MemantoClaw uses Moorcheh — an information-theoretic search engine — to give your agent instant, stateful recall without indexing overhead.
Four lines.
No config, no DB to spin up.
~/.memantoclaw/credentials.json · the sandbox only sees routed local endpointsOne key. One install. A safer way to ship agents.
MemantoClaw is open-source under Apache 2.0. Bring your own model, your own memory, your own policies — or use ours.