Customize the network policy
The NemoClaw sandbox operates under a strict-by-default network policy. Only endpoints listed innemoclaw-blueprint/policies/openclaw-sandbox.yaml are allowed by default. You can extend this policy through static changes to the policy file, dynamic updates to a running sandbox, or by applying a preset for a common service.
Prerequisites
- The NemoClaw source repository for static changes.
- A running NemoClaw sandbox for dynamic changes.
- The OpenShell CLI on your
PATH.
Static changes
Static changes modify the baseline policy file. They take effect the next time the sandbox is created or re-onboarded.Edit the policy file
Open The fields are:
nemoclaw-blueprint/policies/openclaw-sandbox.yaml. Each entry in the network_policies section defines an endpoint group.The policy file uses the following structure:endpoints— Host, port, and HTTP rules for each allowed destination.binaries— Executables permitted to use this endpoint group.rules— HTTP methods and path patterns that are permitted.
Re-run onboard
Apply the updated policy by re-running the onboard wizard:The wizard picks up the modified policy file and applies it to the sandbox.
Dynamic changes
Dynamic changes apply a policy update to a running sandbox without restarting it. They are useful for testing or for temporarily allowing access to a new endpoint.Create a policy file
Write a YAML file with the additional endpoints. Use the same format as the baseline policy:
Policy presets
Thenemoclaw-blueprint/policies/presets/ directory contains ready-to-use policy files for common services. Apply a preset dynamically with openshell policy set:
- Slack
- Hugging Face
- Other presets
Allows the Slack API, webhooks, and API subdomain on port 443:Endpoints:
slack.com, api.slack.com, hooks.slack.comnetwork_policies block from the preset file into openclaw-sandbox.yaml and re-run nemoclaw onboard.
Policy file field reference
| Field | Type | Description |
|---|---|---|
name | string | Unique identifier for this policy group |
endpoints[].host | string | Hostname to allow |
endpoints[].port | integer | Port number (typically 443) |
endpoints[].protocol | string | Protocol type, e.g. rest |
endpoints[].enforcement | string | enforce to block violations, audit to log only |
endpoints[].tls | string | terminate to inspect TLS traffic |
endpoints[].rules[].allow.method | string | HTTP method: GET, POST, PUT, PATCH, DELETE, or * |
endpoints[].rules[].allow.path | string | Path glob, e.g. /** or /api/** |
binaries[].path | string | Absolute path to the binary allowed to use these endpoints |
Related topics
Approve network requests
Use the TUI to allow or block requests from the running agent in real time.
Network policies reference
Baseline policy listing, filesystem rules, and the full operator approval flow.