What if the answer to AI agent security isnât better patches â itâs a fundamentally different architecture?
Thatâs the bet behind NanoClaw, a new open-source agent platform that runs every agent in its own container by default. And when Andrej Karpathy called it out as âreally interesting,â people started paying attention.
The Security Problem NanoClaw Solves
OpenClaw runs bare metal. It uses application-level checks to prevent agents from accessing things they shouldnât. But as recent incidents have shown â from the ClawJacked vulnerability to a Meta execâs deleted inbox â those checks have gaps.
Creator Gavriel Cohen, a software engineer based in Israel, experienced this firsthand. Heâd been using OpenClaw as a sales pipeline manager for his AI marketing agency, connected to WhatsApp, Obsidian, and Kanban boards. It worked well â too well.
âI started to see massive security issues,â Cohen told The Register. âWe were getting a ton of value from it, but itâs burning a hole in my subconscious. It was literally keeping me up at night.â
The problem: even on a dedicated Mac mini, the agent had access to his Chrome profile, social media accounts, and everything else in its environment.
Architecture: Containers All the Way Down
NanoClawâs key insight is isolation by default:
- Each agent runs in its own container â just the agentic loop and the Anthropic Agent SDK, nothing else
- Data access is scoped â connect an agent to WhatsApp and it only sees the specific group you assign, not your entire message history
- Full bash access within the sandbox â agents can install tools and work freely, but only within their container boundaries
This is different from just putting OpenClaw in a container. As Cohen points out, containerizing the entire OpenClaw instance doesnât help because all its integrations and data are still inside the same boundary.
4,000 Lines vs. 400,000
Karpathy highlighted another advantage: NanoClawâs core engine is roughly 4,000 lines of code.
âAnybody could review it, understand it, ask Claude a few questions if you need, and get the sense of whatâs the security model, whatâs the architecture,â Cohen said.
OpenClawâs 400,000-line codebase, by contrast, makes the open-source assumption that âmany eyes will find bugsâ largely theoretical. Itâs unlikely anyone has reviewed the full codebase.
NanoClaw doesnât try to replicate OpenClawâs breadth. Cohen built it around Claude Code in a weekend, deliberately not reinventing what already exists.
âI donât need three thousand integrations. I only need like three things.â
What This Means for the Ecosystem
NanoClaw isnât trying to replace OpenClaw. Itâs solving a different problem: giving people who want strong isolation a platform that provides it architecturally rather than through policy.
For OpenClaw users, the lesson is clear: the security model matters as much as the feature set. If youâre running agents with access to sensitive data â email, messaging, financial tools â the container-first approach addresses a class of vulnerabilities that application-level sandboxing canât fully prevent.
The broader trend is encouraging. Between NanoClawâs container isolation, ClawBands for human-in-the-loop oversight, and OpenClawâs own rapid patching cadence, the ecosystem is taking security seriously.
Competition on security architecture is exactly what this space needs.
Getting Started
NanoClaw is open source on GitHub. If youâre running agents with sensitive data access and container isolation appeals to you, itâs worth evaluating â especially if your use case fits a focused, few-integration setup rather than OpenClawâs kitchen-sink approach.