logoalt Hacker News

mittermayrtoday at 10:29 AM8 repliesview on HN

I wonder how long it'll take (if it hasn't already) until the messaging around this inevitably moves on to "Do not self-host this, are you crazy? This requires console commands, don't be silly! Our team of industry-veteran security professionals works on your digital safety 24/7, you would never be able to keep up with the demands of today's cybersecurity attack spectrum. Any sane person would host their claw with us!"

Next flood of (likely heavily YC-backed) Clawbase (Coinbase but for Claws) hosting startups incoming?


Replies

xg15today at 10:43 AM

What exactly are they self hosting here? Probably not the model, right? So just the harness?

That does sound like the worst of both worlds: You get the dependency and data protection issues of a cloud solution, but you also have to maintain a home server to keep the agent running on?

show 2 replies
alex_trekkoatoday at 2:38 PM

Yep. Not YC backed, but we're working on this over at LobsterHelper.

ShowHN post from yesterday: https://news.ycombinator.com/item?id=47091792

aitchnyutoday at 11:27 AM

There are lots of results for "host openclaw", some from VPS SEO spam, some from dedicated CaaS, some from PaaS. Many of them may be profitable.

show 1 reply
iugtmkbdfil834today at 10:38 AM

In a sense, self-hosting it ( and I would argue for a personal rewrite ) is the only way to limit some of the damage.

alansabertoday at 2:07 PM

I wonder how much the clawbase domain name would sell for, hmm

show 1 reply
empath75today at 12:38 PM

I already built an operator so we can deploy nanoclaw agents in kubernetes with basically a single yaml file. We're already running two of them in production (PR reviews and ticket triaging)

pvtmerttoday at 12:09 PM

Great idea, happy to ~steal~ be inspired by.

I propose a few other common elements:

1. Another AI agent (actually bunch of folks in a 3rd-world country) to gatekeep/check select input/outputs for data leaks.

2. Using advanced network isolation techniques (read: bunch of iptables rules and security groups) to limit possible data exfiltration.

  This would actually be nice, as the agent for whatsapp would run in a separate entity with limited network access to only whatsapp's IP ranges...
3. Advanced orchestration engine (read: crontab & bunch of shell scripts) that are provided as 1st-party components to automate day-to-day stuff.

  Possibly like IFTTT/Zapier/etc. like integration, where you drag/drop objectives/tasks in a *declarative* format and the agent(s) figure out the rest...
show 2 replies