Skip to main content

Documentation Index

Fetch the complete documentation index at: https://mintlify.com/openagen/zeroclaw/llms.txt

Use this file to discover all available pages before exploring further.

ZeroClaw exposes every runtime capability through a single zeroclaw binary. The sections below document each command, its subcommands, and the flags available. Run zeroclaw <command> --help at any time to see the flags your installed version supports.

All commands

CommandDescription
onboardInitialize workspace and configuration (quick or interactive)
agentRun an interactive chat session or send a single message
gatewayStart the webhook and WebSocket HTTP gateway
daemonStart the long-running autonomous runtime (gateway + channels + scheduler)
serviceManage the user-level OS background service (systemd / OpenRC)
doctorRun diagnostics and check daemon, scheduler, and channel freshness
statusPrint the full system configuration and runtime summary
estopEngage, inspect, and resume emergency-stop levels
cronManage scheduled tasks
modelsRefresh, list, and set provider model catalogs
providersList supported provider IDs and their aliases
channelList, start, and health-check channels; bind Telegram identities
integrationsInspect integration setup details
skillsList, audit, install, and remove skills
migrateImport data from other agent runtimes (currently OpenClaw)
configExport the machine-readable configuration JSON Schema
completionsGenerate shell completion scripts to stdout
hardwareDiscover and introspect USB hardware
peripheralConfigure and flash hardware peripherals
authManage subscription auth profiles (OAuth, token-based)
memoryList, inspect, and clear agent memory entries

onboard

Initializes your ~/.zeroclaw/config.toml. The default mode is a fast non-interactive setup; pass --interactive for a guided wizard.
# Quick setup (non-interactive)
zeroclaw onboard --api-key <KEY> --provider openrouter --memory sqlite

# Interactive wizard
zeroclaw onboard --interactive

# Overwrite an existing config without confirmation
zeroclaw onboard --force

# Repair channels and allowlists only
zeroclaw onboard --channels-only

# Full reset: backs up existing config dir and starts fresh
zeroclaw onboard --reinit --interactive
Flags
FlagDescription
--interactiveRun the full guided wizard
--forceOverwrite an existing config.toml without confirmation
--reinitBackup the config directory and create a fresh configuration (requires --interactive)
--channels-onlyReconfigure channels and allowlists only; preserves all other settings
--api-key <KEY>API key (quick mode only; ignored with --interactive)
--provider <ID>Provider ID (default: openrouter)
--model <ID>Model ID override
--memory <TYPE>Memory backend: sqlite, lucid, markdown, or none (default: sqlite)
In non-interactive environments, onboard refuses to overwrite an existing config.toml unless --force is passed. Running --interactive when a config already exists prompts you to choose between a full overwrite and a provider-only update that preserves channels, tunnels, memory, and hooks.

agent

Starts the AI agent loop. Without --message, the command opens an interactive REPL. With --message, it runs a single query and exits.
# Interactive session
zeroclaw agent

# Single-shot query
zeroclaw agent -m "Summarize today's logs"

# Override provider and model
zeroclaw agent --provider anthropic --model claude-sonnet-4-20250514

# Attach a hardware peripheral
zeroclaw agent --peripheral nucleo-f401re:/dev/ttyACM0

# Use a subscription auth profile
zeroclaw agent --provider openai-codex -m "hello"
zeroclaw agent --provider openai-codex --auth-profile openai-codex:work -m "hello"
Flags
FlagDescription
-m, --message <TEXT>Single-message mode; skips the interactive REPL
-p, --provider <ID>Provider to use
--model <ID>Model to use
-t, --temperature <N>Sampling temperature (0.0–2.0)
--peripheral <BOARD:PATH>Attach a hardware peripheral (repeatable)
--auth-profile <ID>Subscription auth profile in <provider>:<profile_name> format
In interactive chat you can ask for model routing changes in natural language—for example, “conversation uses kimi, coding uses gpt-5.3-codex”—and the agent will persist the routing via the model_routing_config tool.

gateway

Starts the HTTP/WebSocket gateway that accepts incoming webhook events. Defaults to 127.0.0.1:42617.
zeroclaw gateway                    # use config defaults
zeroclaw gateway --port 9090        # custom port
zeroclaw gateway --port 0           # random available port
zeroclaw gateway --host 0.0.0.0     # bind all interfaces (requires tunnel or allow_public_bind = true)
Subcommands
SubcommandDescription
startStart the gateway server
restartRestart the gateway server
get-paircodePrint the current pairing code

daemon

Launches the full autonomous runtime: gateway server, all configured channels, heartbeat monitor, and the cron scheduler. This is the recommended production invocation.
zeroclaw daemon                     # use config defaults
zeroclaw daemon -p 9090             # gateway on port 9090
zeroclaw daemon --host 127.0.0.1    # localhost only
Flags
FlagDescription
-p, --port <N>Port for the gateway (0 = random)
--host <HOST>Host to bind

service

Manages the ZeroClaw background service. The init system is auto-detected (systemd on most Linux, OpenRC on Alpine).
zeroclaw service install
zeroclaw service start
zeroclaw service stop
zeroclaw service restart
zeroclaw service status
zeroclaw service uninstall
# Alpine Linux (OpenRC, system-wide)
sudo zeroclaw service install
sudo rc-update add zeroclaw default
sudo rc-service zeroclaw start
Init systemScopeConfig pathPrivilege
systemdUser-level~/.zeroclaw/config.tomlNo sudo
OpenRCSystem-wide/etc/zeroclaw/config.tomlsudo/root

doctor

Runs diagnostics to verify daemon, scheduler, and channel health. The traces subcommand reads tool and model diagnostics from observability.runtime_trace_path.
zeroclaw doctor

# Probe model catalogs
zeroclaw doctor models
zeroclaw doctor models --provider anthropic
zeroclaw doctor models --use-cache

# Inspect runtime traces
zeroclaw doctor traces --limit 20
zeroclaw doctor traces --event tool_call
zeroclaw doctor traces --contains "error"
zeroclaw doctor traces --id <TRACE_ID>

status

Prints the full system configuration and a runtime summary including provider, model, memory backend, channel states, and gateway binding.
zeroclaw status

estop

Engages and manages emergency-stop levels that constrain agent capabilities at runtime.
estop commands require [security.estop].enabled = true in config.toml. When require_otp_to_resume = true, resuming any level requires OTP validation.
# Engage kill-all (default level)
zeroclaw estop

# Engage specific levels
zeroclaw estop --level network-kill
zeroclaw estop --level domain-block --domain "*.chase.com" --domain "*.paypal.com"
zeroclaw estop --level tool-freeze --tool shell --tool browser

# Inspect state
zeroclaw estop status

# Resume levels
zeroclaw estop resume
zeroclaw estop resume --network
zeroclaw estop resume --domain "*.chase.com"
zeroclaw estop resume --tool shell
zeroclaw estop resume --otp 123456
Levels
LevelDescription
kill-allHalt all agent activity (default when no level given)
network-killBlock all outbound network access
domain-blockBlock specific domain patterns (repeatable)
tool-freezeFreeze specific tools (repeatable)

cron

Manages scheduled tasks using cron expressions, RFC 3339 timestamps, durations, or fixed intervals. Cron expressions use the standard 5-field format: min hour day month weekday.
Mutating schedule actions require cron.enabled = true in config.toml. Shell command payloads are validated by the security command policy before job persistence.
# List all scheduled tasks
zeroclaw cron list

# Add a recurring task with cron expression
zeroclaw cron add '0 9 * * 1-5' 'Good morning' --tz America/New_York
zeroclaw cron add '*/30 * * * *' 'Check system health'

# Add a one-shot task at a specific time
zeroclaw cron add-at 2025-01-15T14:00:00Z 'Send reminder'

# Add an interval-based task (milliseconds)
zeroclaw cron add-every 60000 'Ping heartbeat'

# Add a delayed one-shot task
zeroclaw cron once 30m 'Run backup in 30 minutes'

# Manage tasks by ID
zeroclaw cron remove <id>
zeroclaw cron pause <id>
zeroclaw cron resume <id>

models

Manages the provider model catalog cache.
zeroclaw models refresh
zeroclaw models refresh --provider anthropic
zeroclaw models refresh --force

zeroclaw models list
zeroclaw models list --provider openrouter

zeroclaw models set claude-sonnet-4-20250514

zeroclaw models status
Live catalog refresh is supported for: openrouter, openai, anthropic, groq, mistral, deepseek, xai, together-ai, gemini, ollama, llamacpp, sglang, vllm, astrai, venice, fireworks, cohere, moonshot, glm, zai, qwen, and nvidia.

providers

Lists all supported provider IDs and their aliases, and shows the currently active provider.
zeroclaw providers

channel

Manages the messaging channels that connect ZeroClaw to external platforms (Telegram, Discord, Slack, WhatsApp, Matrix, iMessage, Email, and others).
zeroclaw channel list
zeroclaw channel start
zeroclaw channel doctor

# Bind a Telegram identity to the allowlist
zeroclaw channel bind-telegram 123456789

# Add or remove channels
zeroclaw channel add telegram '{"bot_token":"...","name":"my-bot"}'
zeroclaw channel remove my-bot
In-chat runtime commands (Telegram / Discord while the channel server is running):
CommandDescription
/modelsList all available models
/models <provider>List models for a specific provider
/modelShow the current model
/model <id>Switch to a specific model
/newStart a new conversation
The channel runtime hot-reloads changes to default_provider, default_model, default_temperature, api_key, api_url, and reliability.* settings from config.toml without a restart.

integrations

Inspects setup details for a named integration.
zeroclaw integrations info Telegram
zeroclaw integrations info Slack

skills

Manages user-defined capabilities packaged as skills. Every install runs a built-in static security audit before the skill is accepted.
zeroclaw skills list
zeroclaw skills install https://github.com/example/my-skill
zeroclaw skills install /path/to/local/skill
zeroclaw skills audit /path/to/local/skill
zeroclaw skills audit my-installed-skill
zeroclaw skills remove my-skill
The security audit blocks:
  • Symlinks inside the skill package
  • Script-like files (.sh, .bash, .zsh, .ps1, .bat, .cmd)
  • High-risk shell payload snippets
  • Markdown links that escape the skill root or target remote script files
Skill manifests (SKILL.toml) support prompts and [[tools]] entries; both are injected into the agent system prompt at runtime.

migrate

Imports agent data from other runtimes. Currently supports OpenClaw.
# Preview what would be imported
zeroclaw migrate openclaw --dry-run

# Run the migration
zeroclaw migrate openclaw

# Specify a custom source path
zeroclaw migrate openclaw --source /path/to/openclaw

config

Exports the machine-readable JSON Schema (draft 2020-12) for the full config.toml contract.
zeroclaw config schema
zeroclaw config schema > schema.json

completions

Generates shell completion scripts to stdout. The output is intentionally free of log or warning output so it can be sourced directly.
source <(zeroclaw completions bash)

hardware

Discovers and introspects connected USB hardware, identifies known development boards (STM32 Nucleo, Arduino, ESP32), and retrieves chip information via probe-rs / ST-Link.
zeroclaw hardware discover
zeroclaw hardware introspect /dev/ttyACM0
zeroclaw hardware info
zeroclaw hardware info --chip STM32F401RETx

peripheral

Manages hardware peripherals that expose tools to the agent (GPIO, sensors, actuators). Supported boards: nucleo-f401re, rpi-gpio, esp32, arduino-uno.
zeroclaw peripheral list
zeroclaw peripheral add nucleo-f401re /dev/ttyACM0
zeroclaw peripheral add rpi-gpio native
zeroclaw peripheral flash
zeroclaw peripheral flash --port /dev/cu.usbmodem12345
zeroclaw peripheral setup-uno-q
zeroclaw peripheral setup-uno-q --host 192.168.1.10
zeroclaw peripheral flash-nucleo

Build docs developers (and LLMs) love