Everything you need to understand, install, and run Physiclaw.
Physiclaw is open-source software that runs AI agents entirely on your own servers. It provides agent orchestration with no cloud dependency, no telemetry, and no vendor lock-in. You deploy on bare metal, virtual machines, or Kubernetes and keep full control of your data and infrastructure.
The project is adapted from OpenClaw (MIT), re-engineered for enterprise bare-metal deployment with zero external dependencies. It is licensed under Apache 2.0.
Most AI agent platforms require cloud connectivity, send telemetry upstream, or lock you into a vendor ecosystem. Physiclaw is different:
Physiclaw works in three steps:
curl -fsSL https://physiclaw.dev | sh -s -- \ --cluster-name my-agents \ --enable-gpu \ --license oss
docker run -d \ --name physiclaw-core \ --gpus all \ -p 8090:8090 \ -v /var/physiclaw/data:/data \ -e PL_LICENSE=oss \ -e PL_CLUSTER_NAME=my-agents \ ghcr.io/physiclaw/core:latest
helm repo add physiclaw https://physiclaw.dev helm repo update helm install physiclaw-core physiclaw/core \ --namespace physiclaw \ --create-namespace \ --set global.license=oss \ --set gpu.enabled=true \ --set persistence.size=100Gi
git clone https://github.com/CommanderZed/Physiclaw.git cd Physiclaw make deps make build ./bin/physiclaw-server \ --config config/default.yaml \ --data-dir /var/physiclaw/data
Physiclaw ships with pre-built agent personas designed for enterprise workloads. Each persona loads a dedicated toolchain and operates within defined boundaries so you can grant autonomy where it matters while keeping control.
Agents execute tasks by reasoning over your request, selecting tools from their persona toolchain, and operating in an isolated workspace. You control how much autonomy they have and how actions are approved and audited.
Each agent run gets a sandboxed workspace (filesystem and network scoped by config). The agent chooses which tools to call (e.g. query Prometheus, run a Terraform plan, execute a SQL query) and in what order. Tool outputs are fed back into the model for the next step until the task is done or a limit is reached. All tool invocations are logged and can be tied to an audit trail.
You can configure agents to run in fully autonomous mode (execute and report), approval-required mode (propose actions and wait for human approval), or read-only mode (query and suggest only). This is typically set per persona or per environment (e.g. production requires approval, staging allows autonomy). Escalation paths (e.g. notify Slack, create a ticket) are configurable when an agent needs human input or when a run fails.
Tool use can be restricted by allowlists (e.g. which APIs or commands an agent may call), rate limits, and scope (e.g. which namespaces or projects). Sensitive operations (key access, destructive changes) can be gated behind approval or restricted entirely. This gives enterprise teams confidence to grant autonomy for routine work while keeping high-impact actions under control.
Every layer runs inside your perimeter. Physiclaw implements defense-in-depth with five concentric security rings so you can meet strict compliance and air-gap requirements without trading off on agent capability.
| Ring | Layer | Primitives |
|---|---|---|
| 0 | Zero Trust Isolation | gVisor, Seccomp-BPF, eBPF, UCAN, AES-256 |
| 1 | End-to-End Encryption | mTLS, SPIFFE, XChaCha20, X.509, Auto-Rotate |
| 2 | Hardware Secrets | HSM, TPM 2.0, Vault, PKCS#11, Sealed Keys |
| 3 | Observability & Provenance | OTel, Attestation, Merkle Log, Sigstore, WORM |
| 4 | Air-Gap & Compliance | Offline, SOC 2, HIPAA, FedRAMP, ISO 27001 |
Agent runs and tool calls can be recorded in a tamper-evident Merkle log or similar backend. Outputs can be signed (e.g. with Cosign) so you have cryptographic proof of what an agent did and when. This supports compliance (SOC 2, HIPAA, FedRAMP) and internal governance. Audit logs can be exported to your SIEM or retention store (WORM) so nothing is lost and everything is attributable.
API keys, model weights, and RAG credentials are never stored in plaintext on disk. Support for HSM, TPM 2.0, and Vault lets you seal secrets to hardware identity and rotate them without agent downtime. Key material is available only to the process that needs it and is not exposed in logs or telemetry.
Physiclaw is built for organizations that need agent autonomy without losing control. Deployment patterns, governance, and operational guardrails are designed so security and platform teams can standardize how agents run across environments.
Run a single node for dev or small teams; scale horizontally with multiple gateway and worker nodes for production. You can deploy behind your existing load balancer and identity provider. Agents can be scoped by namespace, project, or tag so different teams or environments get the right personas and tool access without cross-tenant leakage.
Define who can invoke which agents and with what autonomy level (e.g. read-only vs. autonomous). Approval workflows can require one or more human approvals for sensitive actions. All invocations and decisions are auditable. This lets you roll out autonomy gradually: start with read-only and recommendations, then enable approved actions, then autonomous execution where policy allows.
You own the full stack: models, inference runtime, vector store, and audit backend. There is no vendor lock-in or mandatory SaaS. You can air-gap the entire system, run in disconnected regions, and meet regulatory requirements (e.g. data residency, no telemetry) while still giving teams the benefits of AI-powered automation.
Everything is a config change. Swap runtimes, vector stores, and audit backends in YAML. No vendor calls, no lock-in.
# physiclaw.yaml runtime: backend: "vllm" # vllm, tgi, ollama, triton model: "llama-3-70b" # any GGUF / safetensors weight gpu_layers: "auto" # offload control max_concurrent: "64" # per-node parallelism knowledge: store: "pgvector" # pgvector, faiss, milvus, qdrant embedder: "bge-large" # on-prem embedding model chunker: "semantic" reranker: "cross-encoder" audit: backend: "merkle-log" # tamper-evident storage signing: "cosign" # cryptographic verification export: "siem-sink" # compliance export retention: "forever" # WORM retention
Supported runtimes: vLLM, TGI, Ollama, GGUF, ONNX, Triton
Supported vector stores: pgvector, FAISS, Milvus, Qdrant
Supported embedding models: BGE-Large, E5-Mistral, Nomic-Embed, Local ONNX
Physiclaw connects to common enterprise on-prem services so agents can use the tools you already run inside your perimeter. Supported integrations include:
From the Physiclaw core repo:
pnpm install pnpm dev # development mode pnpm build # build node physiclaw.mjs gateway # start gateway
The marketing site and docs live in the website/ directory (Next.js). To run locally:
cd website npm install npm run dev
Open http://localhost:3000. The live site is at https://www.physiclaw.dev.
/ ├── src/ # Core engine │ ├── agents/ # Agent execution, tools, workspace │ ├── cli/ # CLI (Commander.js) │ ├── config/ # YAML config, Zod validation │ ├── daemon/ # Service management (launchd/systemd) │ ├── gateway/ # HTTP/WebSocket control plane │ ├── plugins/ # Plugin infrastructure │ ├── providers/ # AI model provider integrations │ └── security/ # Audit, scanning, hardening ├── skills/ # Agent personas (sre, secops, data-architect, code-janitor) ├── config/ # Default YAML ├── packages/ # Shared packages ├── extensions/ # Extension plugins ├── website/ # Marketing + docs (Next.js) ├── Dockerfile ├── docker-compose.yml └── physiclaw.mjs # CLI entry
Yes. It runs fully offline with no external trust boundaries. No telemetry, no phone-home.
Apache License 2.0. You can read the full text at apache.org/licenses/LICENSE-2.0.txt. The core agent runtime is adapted from OpenClaw (MIT).
Yes. You configure the runtime (vLLM, TGI, Ollama, etc.) and point to your own GGUF or safetensors weights.
The site and documentation are deployed at https://www.physiclaw.dev. Docs are at www.physiclaw.dev/docs.
For more detail, see the Whitepaper and the GitHub repository.