User is experimenting with self-hosting OpenClaw and seeks feedback on security measures. They want to ensure that the setup is safe and controlled, suggesting the need for enhanced security features in the application.
Hey everyone, I’ve been experimenting with the idea of self-hosting OpenClaw on my Raspberry Pi, mainly because I want to better understand how to run it safely in a home setup and have more control over what it can and cannot access. My main goal is not just to get OpenClaw running, but to build a setup where I can actually play around with it, test things, and experiment without feeling like I’m giving an autonomous coding agent unrestricted access to my network. So I put together a small project called **Lobster Cage**: [`https://github.com/wwlarsww/lobster-cage`](https://github.com/wwlarsww/lobster-cage) The idea behind it is basically to put OpenClaw inside a more locked down Docker compose environment, with things like restricted outbound access, proxy-based routing, and generally a more controlled setup for self-hosting on a Pi. It’s still very much an experimental project, but I’ve reached a point where it works well enough to share and get some outside opinions on it. I’d really appreciate feedback on things like: * the overall architecture * obvious weak points or bad assumptions * whether parts of it are overengineered or not strict enough * how this could be hardened further * better ways to isolate or restrict an agent like this on a Raspberry Pi * anything important I may have overlooked I’m especially interested in hearing from people who have tried to self-host OpenClaw in a secure way. Any feedback, criticism, or ideas would be appreciated.