The Complete Story: When the Dust Settles, the Project Not Only Survived But Matured
OpenClaw (formerly Clawdbot, briefly Moltbot) has achieved 106,000+ GitHub stars and 14,900+ forks after a tumultuous journey through three name changes, account hijackings, crypto scams, and intensive security scrutiny. The Current Reality: The project has emerged from chaos with professional infrastructure—trademark searches completed preemptively, domains secured, 34 security-related commits implemented, machine-checkable security models deployed, and clear warnings about prompt injection risks. The Core That Survived: Self-hosted AI agent running on user's machine, living inside familiar chat apps (WhatsApp, Telegram, Discord, Slack, Google Chat, Signal, iMessage, Teams), powered by user-chosen models (Anthropic, OpenAI, KIMI, Xiaomi MiMo-V2-Flash), with persistent memory, real system access, and modular Skills ecosystem. The Architectural Strength: Gateway WebSocket control plane connecting multi-channel inbox, multi-agent routing, voice wake/talk mode, live canvas, browser control, nodes system, and comprehensive tool ecosystem. The Security Evolution: Project now treating security as first-class concern (DM pairing policy by default, sandbox options, permission controls) rather than afterthought—acknowledging that self-hosted agents with shell/email access plus chat integrations represent genuine infrastructure responsibility. The Name Philosophy: “Open” (open-source/community-driven/self-hosted) + “Claw” (honoring lobster mascot heritage)—model-agnostic positioning replacing earlier “Claude with hands” framing.
Part I: The Naming Journey—From Viral Hack to Professional Infrastructure
Clawd (November 2025 – January 27, 2026)
Original Concept: Weekend hack by Peter Steinberger (PSPDFKit founder)
Name Origin: Phonetic pun (Claude + claw) honoring lobster loading icon
Explosive Growth: 10,000+ to 100,000+ GitHub stars
Viral Appeal: “7×24 AI employee,” “open-source JARVIS” framing
Legal Problem: Too similar to Anthropic's “Claude”—cease-and-desist received
Community Size: Rapidly expanding developer base worldwide
The Turning Point: Forced rebrand triggering cascading consequences
Moltbot (January 27-29, 2026)
Emergency Genesis: 5 AM Discord brainstorming session
Symbolic Intent: “Molt” (shedding exoskeleton) representing growth/transformation
Triple Failure:
1. Pronunciation Disaster: Chinese interpretation “摸头bot” (head-patting bot)—lost gravitas
2. Vocabulary Obscurity: Most users unfamiliar with biological term “molting”
3. Domain Squatting Frenzy: Cybersquatters grabbed domains, social accounts; scam cryptocurrency launched exploiting confusion
Duration: Mere 48 hours before community backlash forced reconsideration
The Lesson: Rushed panic decisions compound problems exponentially
OpenClaw (January 29, 2026 – Present)
Professional Preparation:
- Trademark searches completed before announcement
- Domains purchased proactively (openclaw.ai, molt.bot)
- Social media accounts secured across platforms
- Migration code written and tested
- Community consultation conducted
Name Components:
“Open”: Open-source commitment, community-driven development, self-hosted capability, transparent operations
“Claw”: Preserves lobster mascot, honors project heritage, maintains brand continuity, simple memorable imagery
Peter Steinberger's Declaration: “This name will stay”—implying lessons internalized
The Sacred Symbol: Lobster mascot “inviolable,” most recognizable cultural icon
Part II: What Actually Survived the Chaos
The Codebase Remained Solid
Core Vision Unchanged:
- Personal AI assistant running on user's own devices
- Chat app integration (WhatsApp, Telegram, Slack, Discord, Google Chat, Signal, iMessage, BlueBubbles, Microsoft Teams, Matrix, Zalo, WebChat)
- Model-agnostic architecture (user chooses brain)
- Persistent memory and real system access
- Modular Skills platform
Technical Excellence Validated: Despite naming chaos, underlying software always compelling
The Tagline: “Your assistant. Your machine. Your rules.”—philosophy explicit after security wake-up call
The Community Stayed Loyal
Why Users Persisted:
- Genuine practical utility (real productivity gains)
- Privacy protection (local data sovereignty)
- Developer appeal (open-source ethos, extensibility)
- Cultural identity (beloved lobster transcending technical features)
Contribution Patterns: Plugin development, security reviews, documentation improvements, translations
Discussion Platforms: GitHub Issues/Discussions, Discord channels, social media groups
The Momentum Accelerated
Current Metrics (January 2026):
- 106,000+ GitHub stars
- 14,900+ forks
- Active development continuing
- Growing contributor base
What Didn't Survive (Positive Losses):
- Sloppy operational practices
- Casual security assumptions
- “We'll fix it later” energy
- Brand confusion with Anthropic
The Evolution: From “cool hack” to “serious infrastructure”—tone finally matching reality
Part III: The Security Turning Point
34 Security-Related Commits
The Implicit Acknowledgment: Earlier criticism wasn't wrong
Machine-Checkable Security Models: Programmatic security analysis, automated vulnerability detection
Clear Prompt Injection Warnings: Unsolved industry problem explicitly surfaced
The Reality: Self-hosted AI agents with shell access, email access, chat integrations, persistent memory inherently dangerous if treated casually
Default Security Posture
DM Pairing Policy (dmPolicy="pairing"):
- Unknown senders receive short pairing code
- Bot doesn't process messages from unverified sources
- Approval via
moltbot pairing approve <channel> <code> - Sender added to local allowlist after approval
Public Inbound DM Risk: Requires explicit opt-in (dmPolicy="open" + "*" in allowlist)
Doctor Command: moltbot doctor surfaces risky/misconfigured DM policies
Sandbox Options: Non-main sessions (groups/channels) can run in per-session Docker sandboxes
Permission Controls
Gateway Security:
- Token/password authentication for web surfaces
- Tailscale Serve (tailnet-only) or Funnel (public HTTPS) options
- Loopback binding enforcement when Serve/Funnel enabled
Node Permissions: macOS TCC permission status for system.run, camera, screen recording, location
Tool Allowlists: Sandbox mode allows bash, process, read, write, edit, sessions_*; denylists browser, canvas, nodes, cron, discord, gateway
The First-Class Concern Framework
Security Now Front and Center: Not magical solution but signals maturity
Infrastructure Responsibility: Project crossed line from casual experiment to serious tool
User Education: Documentation emphasizing risks, deployment best practices, monitoring requirements
Part IV: The Technical Architecture
Gateway WebSocket Control Plane
Single WS Endpoint: ws://127.0.0.1:18789 by default
Manages:
- Sessions and presence
- Channel routing
- Tool execution
- Event coordination
- Configuration
- Cron jobs
- Webhooks
Clients Connect: CLI (moltbot), WebChat UI, macOS app, iOS/Android nodes
Multi-Channel Inbox
Supported Platforms:
Core Channels: WhatsApp (Baileys), Telegram (grammY), Slack (Bolt), Discord (discord.js), Google Chat (Chat API), Signal (signal-cli), iMessage (imsg)
Extension Channels: BlueBubbles, Microsoft Teams, Matrix, Zalo, Zalo Personal, WebChat
User Experience: Direct AI assistant invocation within familiar chat tools—no app switching required
Group Routing: Mention gating, reply tags, per-channel chunking, group allowlists
Multi-Agent Routing
Session Model: main for direct chats, isolated group sessions, activation modes, queue modes, reply-back capability
Agent Isolation: Route inbound channels/accounts/peers to isolated agents with separate workspaces and sessions
Cross-Agent Coordination: sessions_list, sessions_history, sessions_send tools enable agent-to-agent work delegation
Model-Agnostic Brain
Subscription OAuth:
- Anthropic (Claude Pro/Max)
- OpenAI (ChatGPT/Codex)
API Integration:
- Anthropic (Claude Opus 4.5 recommended)
- OpenAI (GPT series)
- Google (Gemini)
- xAI (Grok)
- DeepSeek
- MiniMax M2.1 (creator-recommended)
- Xiaomi MiMo-V2-Flash (newly added)
- KIMI K2.5 (newly added)
- Zhipu GLM
- Perplexity
- OpenRouter
- Local models via Ollama
Model Failover: Auth profile rotation, fallback mechanisms
No Vendor Lock-In: Switch models without losing context (persistent memory independent of model choice)
Part V: Advanced Capabilities
Voice Wake + Talk Mode
macOS/iOS/Android Support: Always-on speech with ElevenLabs
Voice Wake: “Computer” trigger word (Star Trek style)
Talk Mode: Push-to-talk overlay, continuous conversation
Transcription: OpenAI Whisper integration for audio processing
Live Canvas
Agent-Driven Visual Workspace: A2UI (Actions-to-UI) push/reset, eval, snapshot
Available On: macOS, iOS, Android nodes
Use Cases: Visual dashboards, dynamic interfaces, real-time data display
Browser Control
Dedicated Moltbot Chrome/Chromium: CDP (Chrome DevTools Protocol) control
Capabilities:
- Snapshots
- Actions automation
- File uploads
- Profile management
Configuration: Optional tool enabled via browser.enabled: true
Nodes System
Device-Local Actions via node.invoke:
macOS Node Mode:
system.run(local command execution)system.notify(user notifications)- Screen recording (TCC permission required)
- Camera snap/clip
location.get
iOS/Android Nodes:
- Canvas surface
- Camera capture
- Screen recording
- Location services
- Pairs via Bridge + pairing flow
Permission Map: Advertised over Gateway WebSocket (node.list, node.describe)
Skills Platform
ClawdHub Registry: Minimal skill registry enabling automatic skill search and installation
Skill Types:
- Bundled Skills: Included with installation
- Managed Skills: Curated official skills
- Workspace Skills: User-custom skills in
~/clawd/skills/
Current Library: 100+ preconfigured plugins
Skill Structure: SKILL.md files containing instructions, scripts, resources
Installation: Simple /install command or wizard-driven setup
Automation & Triggers
Cron Jobs: Schedule recurring tasks
Webhooks: External trigger surface
Gmail Pub/Sub: Email-based triggers
Wakeups: Proactive agent initiation
Part VI: The Decoupling From Anthropic
Model-Agnostic Positioning
Subtle But Critical Shift: OpenClaw announcement barely mentions Anthropic
Earlier Framing: “Claude with hands”—viral but legally fragile
Current Positioning: Model-agnostic infrastructure platform
Evidence: KIMI, Xiaomi MiMo integration announcements alongside traditional OpenAI/Anthropic support
Strategic Benefits:
- No single vendor dependency
- No implied endorsement confusion
- No brand overlap concerns
- Sustainable long-term positioning
The Trademark Lesson
Whether Or Not You Agree: With Anthropic's enforcement, decoupling inevitable for project survival
OpenClaw Strategy: Clear differentiation through:
- Distinct branding (lobster mascot)
- Explicit multi-model support
- Infrastructure not model emphasis
- Community governance not corporate association
Part VII: Installation and Deployment
Quick Start
Requirements: Node ≥22
One-Line Install:
npm install -g moltbot@latest
moltbot onboard --install-daemon
Launch Gateway:
moltbot gateway --port 18789 --verbose
Send Message:
moltbot message send --to +1234567890 --message "Hello from OpenClaw"
Talk to Assistant:
moltbot agent --message "Ship checklist" --thinking high
Development From Source
Preferred Package Manager: pnpm for builds
Clone and Build:
git clone https://github.com/openclaw/openclaw.git
cd openclaw
pnpm install
pnpm ui:build
pnpm build
pnpm moltbot onboard --install-daemon
Dev Loop:
pnpm gateway:watch # auto-reload on TypeScript changes
Deployment Options
Local Machine: Old computer, Raspberry Pi, Mac mini
VPS: $5/month cloud server (Hetzner, DigitalOcean, Fly.io)
Docker: Containerized deployment for isolation
Nix: Declarative configuration management
Remote Gateway: Run on Linux instance, connect over Tailscale or SSH tunnels
Configuration
Minimal ~/.clawdbot/moltbot.json:
{
"agent": {
"model": "anthropic/claude-opus-4-5"
}
}
Full Configuration: Comprehensive reference at docs.molt.bot/gateway/configuration
Part VIII: The Bigger Lessons
Open-Source at Viral Scale
When:
- Velocity meets massive attention
- Indie builders accidentally become infrastructure
- “Side project” crosses into real-world risk
Then: Responsibility frameworks must evolve rapidly
OpenClaw's Response: Acting like project that understands infrastructure duty
Security Can't Be Afterthought
Traditional Approach: Build fast, add security later
Reality Check: Projects granting system access face immediate scrutiny
New Standard: Security as first-class concern from beginning
Implementation: Default pairing policies, sandbox options, permission controls, security documentation
Community Resilience Tested
What Survived:
- Codebase quality
- Core vision
- User loyalty
- Development momentum
What Didn't:
- Casual operational practices
- Security complacency
- Brand confusion
Result: Stronger foundation through adversity
The Lobster Metaphor Lives
Molting: Shedding old shell to grow
Hardening: Strengthening new shell afterward
OpenClaw Journey: Not just growing but building resilience
Conclusion: Sustainability Over Chaos
The Reset That Worked
Not Erasing History: But demonstrating learning
Professional Infrastructure:
- Proper trademark clearance
- Secured digital properties
- Security-first architecture
- Clear documentation
- Sustainable governance
Boring Professionalism: Exactly what viral project needed after chaos
What Makes OpenClaw Different Now
Technical Excellence: Maintained throughout turbulence
Privacy Commitment: “Your machine, your rules” explicit
Community Governance: Transparent, inclusive decision-making
Security Maturity: Acknowledging responsibility that comes with power
For Users Trying OpenClaw Today
Read Security Docs: Understand what you're granting access to
Don't Expose Publicly: Keep behind VPN, Tailscale, or localhost
Treat As Powerful Tool: Respect system-level permissions
Start Safely: Use sandbox mode for non-personal sessions
Monitor Usage: Watch what agent actually does
The Path Forward
Short-Term: Security hardening, documentation enhancement, team expansion
Long-Term: Household/team/enterprise adoption, ecosystem development, sustainable funding
Market Position: Leading open-source local AI agent platform
Future Outlook: Stable foundation enabling ambitious expansion
The Bottom Line: OpenClaw's journey from Clawdbot through Moltbot to final stable branding represents compressed master class in open-source project maturation. The chaos chapter—account hijackings, crypto scams, forced rebrands, security wake-up calls—tested project's foundation and forced rapid professionalization. What emerged is stronger: 106,000+ stars, professional infrastructure, security-first posture, model-agnostic positioning, sustainable governance. The lobster didn't just molt and grow—it hardened its shell. Core vision survived intact: self-hosted AI agent living in familiar chat apps, powered by user-chosen models, with persistent memory and real system access. Security now treated as first-class concern rather than afterthought. Community proved resilient through turbulence. The name OpenClaw finally captures essence: open-source values honoring original identity. For users, message clear—powerful infrastructure deserves respect, proper configuration, and understanding of granted permissions. Chaos chapter over. Sustainability chapter beginning.
Official Resources:
- Website: https://openclaw.ai (also molt.bot)
- GitHub: https://github.com/openclaw/openclaw
- Docs: https://docs.molt.bot
- Discord: https://discord.gg/clawd
The Project Survived. Now It's Time to Build.








