Skip to content

NanoClaw vs ZeroClaw Deep Dive

Two Radically Different Paths Away From OpenClaw

NanoClaw vs ZeroClaw 深度解析

兩條截然不同的 OpenClaw 替代路線


"Security at the expense of usability comes at the expense of security." — AviD's Rule of Usability

「以犧牲可用性為代價的安全,最終會犧牲安全本身。」—— AviD 可用性法則


Why Not Just Use OpenClaw?

OpenClaw proved the concept: a self-hosted AI assistant that connects to your messaging apps and takes autonomous actions. With 320k+ GitHub stars and 5,400+ community skills on ClawHub, it's the category king.

But OpenClaw has structural problems:

  • 434,000 lines of TypeScript, 53 config files, 70+ dependencies — nearly impossible to audit
  • 1+ GB RAM usage with 500ms+ cold starts
  • 9 CVEs and counting, including CVE-2026-25253 (remote code execution)
  • 36% of audited ClawHub skills contain prompt injection vulnerabilities
  • Agents run bare-metal on the host with application-level permission checks

NanoClaw and ZeroClaw both agree: OpenClaw's security model is fundamentally flawed. But they disagree completely on how to fix it.

PhilosophyNanoClawZeroClaw
Core thesisTrust no agent — isolate everything in containersTrust no bloat — rewrite everything in Rust
LanguageTypeScript (~3,900 lines)Rust (3.4 MB binary)
Security approachOS-level isolation (containers)Language-level safety (Rust ownership) + encrypted secrets
Stars~23.8k~27.6k
CreatedJanuary 31, 2026February 2024
LicenseMITMIT + Apache 2.0

為什麼不直接用 OpenClaw?

OpenClaw 證明了這個概念:一個自架的 AI 助手,連接你的通訊軟體並自主執行動作。擁有超過 320k GitHub 星和 ClawHub 上 5,400+ 個社群 skill,它是這個類別的霸主。

但 OpenClaw 有結構性問題:

  • 434,000 行 TypeScript、53 個設定檔、70+ 個相依套件——幾乎不可能審計
  • 1+ GB 記憶體使用,冷啟動 500ms 以上
  • 9 個 CVE 且持續增加,包括 CVE-2026-25253(遠端程式碼執行)
  • 36% 被審計的 ClawHub skill 包含 prompt injection 漏洞
  • Agent 在主機上裸跑,使用應用層級的權限檢查

NanoClaw 和 ZeroClaw 都同意:OpenClaw 的安全模型根本上有缺陷。但它們對如何修復完全持不同意見。

哲學NanoClawZeroClaw
核心論點不信任任何 agent——把一切隔離在容器中不信任任何膨脹——用 Rust 重寫一切
語言TypeScript(約 3,900 行)Rust(3.4 MB 二進位檔)
安全方式作業系統層級隔離(容器)語言層級安全(Rust 所有權)+ 加密 secret
星數約 23.8k約 27.6k
建立日期2026 年 1 月 31 日2024 年 2 月
授權MITMIT + Apache 2.0

NanoClaw: The Container-First Minimalist

Architecture

NanoClaw is a single Node.js process that orchestrates ephemeral containers. Every agent session — every chat group — gets its own isolated container with its own filesystem, Claude session, and memory.

Messages (WhatsApp/Telegram/Slack/Discord)


SQLite (message store)


Polling Loop (orchestrator, ~3,900 lines TypeScript)


┌─────────────────────────────────────────────┐
│  Container per group                         │
│  ┌─────────────┐  ┌──────────┐  ┌────────┐ │
│  │ Claude Agent │  │ CLAUDE.md│  │ Files  │ │
│  │    SDK       │  │ (memory) │  │(mounted│ │
│  │              │  │          │  │ r/w)   │ │
│  └─────────────┘  └──────────┘  └────────┘ │
└─────────────────────────────────────────────┘

The entire codebase is ~15 files. You can read the whole thing in under 8 minutes. At 34.9k tokens, an AI can reason about the full project in a single context window — which is the point.

Key source files:

FilePurpose
src/index.tsOrchestrator: state machine, message loop, agent invocation
src/container-runner.tsContainer lifecycle management
src/group-queue.tsPer-group FIFO queue, 3 concurrent containers by default
src/channels/registry.tsAuto-detect channels by which credentials are present
src/db.tsSQLite operations
src/task-scheduler.tsScheduled and recurring tasks

Security Model

NanoClaw's security thesis: agents are untrusted and potentially malicious. Don't try to check permissions in code — use OS-level isolation.

Three container runtime tiers:

TierRuntimeIsolation LevelPlatform
1Docker SandboxesHypervisor-level (microVM, own kernel)macOS Apple Silicon, Windows
2DockerStandard container isolationmacOS, Linux
3Apple ContainerNative macOS containermacOS

What's isolated per agent:

  • Own filesystem — agents can't see each other's data
  • Own Claude session — no context leakage between groups
  • Unprivileged user — no root access
  • Host code mounted read-only
  • Bash access is safe — commands execute inside the container, not on the host

Mount allowlist (~/.config/nanoclaw/mount-allowlist.json):

Stored outside the project directory so a compromised agent can't modify its own permissions. Blocks .ssh, .gnupg, .aws, .env, private_key, credentials by default.

Honest limitation: Container isolation "contains damage" — it doesn't eliminate risk. The "lethal trifecta" (data access + untrusted content + external communication) means prompt injection can still exploit pathways within the container's scope.

LLM Support

Claude-optimized via Anthropic Agent SDK. Other LLMs (Ollama, Together AI, Fireworks) require middleware. This is the biggest trade-off — NanoClaw is effectively Claude-only for most users.

Messaging Platforms

PlatformStatusNotes
WhatsAppBuilt-inQR code or pairing code auth
TelegramVia skillStandalone or paired mode
Telegram SwarmVia skillMulti-agent with individual bot identities
DiscordBuilt-inText channels with attachments
SlackBuilt-inSocket Mode (no public URL needed)
GmailVia skillRead, send, search, draft
SignalPlannedRFS (Request for Skill) status

Capabilities (18 Official Skills)

Messaging: WhatsApp, Telegram, Telegram Swarm, Discord, Slack

Tools: Agent Browser (pages, forms, screenshots), Gmail, PDF Reader, Image Vision, Local Whisper (on-device voice transcription), Ollama (local AI), Smart Home (Home Assistant)

Utility: Compact (context compaction), Debug, Customize, Update NanoClaw

Setup

bash
gh repo fork qwibitai/nanoclaw --clone
cd nanoclaw
claude
/setup

No config files. The philosophy is "AI-native" — Claude Code guides your setup conversationally. To customize, you tell Claude what you want and it modifies the codebase directly.

Community

  • 23.8k stars, 6.4k forks, 53+ contributors
  • Docker partnership (March 13, 2026) — first claw platform integrated with Docker Sandboxes
  • Andrej Karpathy public endorsement
  • Media: TechCrunch, VentureBeat, The Register, Fortune, CNBC
  • Active Discord server

NanoClaw:容器優先的極簡主義者

架構

NanoClaw 是一個單一 Node.js 程序,編排短暫的容器。每個 agent session——每個聊天群組——都有自己隔離的容器,包含自己的檔案系統、Claude session 和記憶。

訊息(WhatsApp/Telegram/Slack/Discord)


SQLite(訊息儲存)


輪詢迴圈(編排器,約 3,900 行 TypeScript)


┌─────────────────────────────────────────────┐
│  每個群組一個容器                              │
│  ┌─────────────┐  ┌──────────┐  ┌────────┐ │
│  │ Claude Agent │  │ CLAUDE.md│  │ 檔案   │ │
│  │    SDK       │  │ (記憶) │  │(掛載  │ │
│  │              │  │          │  │ r/w)  │ │
│  └─────────────┘  └──────────┘  └────────┘ │
└─────────────────────────────────────────────┘

整個 codebase 約 15 個檔案。你可以在 8 分鐘內讀完。34.9k token,AI 可以在單一 context window 中推理整個專案——這正是重點。

關鍵原始碼檔案:

檔案用途
src/index.ts編排器:狀態機、訊息迴圈、agent 呼叫
src/container-runner.ts容器生命週期管理
src/group-queue.ts每群組 FIFO 佇列,預設 3 個並行容器
src/channels/registry.ts根據存在的憑證自動偵測頻道
src/db.tsSQLite 操作
src/task-scheduler.ts排程與循環任務

安全模型

NanoClaw 的安全論點:agent 是不受信任且可能有惡意的。不要試圖在程式碼中檢查權限——使用作業系統層級的隔離。

三種容器 runtime 層級:

層級Runtime隔離等級平台
1Docker SandboxesHypervisor 層級(microVM,獨立 kernel)macOS Apple Silicon、Windows
2Docker標準容器隔離macOS、Linux
3Apple Container原生 macOS 容器macOS

每個 agent 被隔離的內容:

  • 自己的檔案系統——agent 看不到彼此的資料
  • 自己的 Claude session——群組間沒有 context 洩漏
  • 非特權使用者——沒有 root 存取
  • 主機程式碼以唯讀方式掛載
  • Bash 存取是安全的——指令在容器內執行,不在主機上

掛載白名單~/.config/nanoclaw/mount-allowlist.json):

儲存在專案目錄外,被入侵的 agent 無法修改自己的權限。預設封鎖 .ssh.gnupg.aws.envprivate_keycredentials

誠實的限制: 容器隔離「控制損害」——不能消除風險。「致命三重奏」(資料存取 + 不受信任的內容 + 外部通訊)意味著 prompt injection 仍能利用容器範圍內的路徑。

LLM 支援

透過 Anthropic Agent SDK 針對 Claude 優化。其他 LLM(Ollama、Together AI、Fireworks)需要中介軟體。這是最大的取捨——對大多數使用者來說,NanoClaw 實質上是 Claude 專用

訊息平台

平台狀態備註
WhatsApp內建QR code 或配對碼認證
Telegram透過 skill獨立或配對模式
Telegram Swarm透過 skill多 agent,各有獨立 bot 身份
Discord內建文字頻道含附件
Slack內建Socket Mode(不需公開 URL)
Gmail透過 skill讀取、傳送、搜尋、草稿
Signal計畫中RFS(Request for Skill)狀態

能力(18 個官方 Skill)

訊息: WhatsApp、Telegram、Telegram Swarm、Discord、Slack

工具: Agent Browser(頁面、表單、截圖)、Gmail、PDF Reader、Image Vision、Local Whisper(裝置上語音轉錄)、Ollama(本地 AI)、Smart Home(Home Assistant)

實用工具: Compact(context 壓縮)、Debug、Customize、Update NanoClaw

安裝

bash
gh repo fork qwibitai/nanoclaw --clone
cd nanoclaw
claude
/setup

沒有設定檔。哲學是「AI 原生」——Claude Code 以對話方式引導你完成設定。要自訂,你告訴 Claude 你想要什麼,它直接修改 codebase。

社群

  • 23.8k 星、6.4k fork、53+ 貢獻者
  • Docker 合作夥伴關係(2026 年 3 月 13 日)——第一個與 Docker Sandboxes 整合的 claw 平台
  • Andrej Karpathy 公開推薦
  • 媒體:TechCrunch、VentureBeat、The Register、Fortune、CNBC
  • 活躍的 Discord 伺服器

ZeroClaw: The Rust Performance Purist

Architecture

ZeroClaw is a single compiled Rust binary. No Node.js, no Python, no runtime interpreter. Three discrete services:

┌──────────────────────────────────────────────┐
│ zeroclaw agent   — CLI chat interface         │
│ zeroclaw daemon  — Autonomous runtime         │
│                    (systemd-managed)           │
│ zeroclaw gateway — Webhook server             │
│                    (127.0.0.1:42617)          │
│                    + Web dashboard (:3000)     │
├──────────────────────────────────────────────┤
│ Tokio async runtime (work-stealing executor)  │
│ ~7 threads per bot (vs ~20+ for OpenClaw)     │
├──────────────────────────────────────────────┤
│ SQLite + vector search (70/30 hybrid)         │
│ ChaCha20-Poly1305 encryption at rest          │
│ Arena allocation, ownership-based safety      │
└──────────────────────────────────────────────┘

Workspace: ~/.zeroclaw/workspace/ containing sessions, memory, state, cron jobs, skills, and identity files (IDENTITY.md, AGENTS.md, SOUL.md, TOOLS.md).

Trait-driven design: Providers, memory backends, tools, channels, and tunnels are all swappable via Rust traits — no vendor lock-in at the type level.

Security Model

ZeroClaw's security thesis: eliminate entire vulnerability classes at compile time via Rust's ownership system, then encrypt everything at rest.

Five-layer security:

LayerMechanism
NetworkBinds to 127.0.0.1 by default, rate limiting, 64KB body limit
Authentication6-digit OTP pairing-based verification
AuthorizationThree autonomy levels, command allowlists, domain restrictions
RuntimeOptional Docker sandbox, read-only rootfs, memory/CPU limits
DataChaCha20-Poly1305 encryption at rest; secrets never in env vars

Rust-inherent safety: The ownership system eliminates buffer overflows, use-after-free, and data races at compile time. These are vulnerability classes that have historically generated CVEs across systems software. OpenClaw has 9+ CVEs; ZeroClaw has zero.

"Sovereign" mode: All API keys remain local. No external orchestration service is contacted.

Honest limitation: Hacker News security researchers consider the approach "naive" for focusing on access control without adequately addressing prompt injection and AI behavioral manipulation.

LLM Support (22+ Providers)

ProviderNotes
Anthropic / ClaudeAPI key and auth token
OpenAIIncluding Codex with OAuth
Google GeminiFull support
OpenRouterMulti-model gateway
GitHub CopilotVia API
DeepSeek, Qwen, GroqSupported
Ollama, LM StudioLocal models
Any OpenAI-compatible endpointVia custom config

This is ZeroClaw's biggest advantage over NanoClaw — true model-agnostic support with 22+ providers out of the box.

Messaging Platforms (30+ Channels)

PlatformStatus
TelegramBuilt-in, with voice
DiscordBuilt-in
SlackBuilt-in
MatrixBuilt-in, with E2EE
WhatsApp WebRequires --features whatsapp-web compile flag; not in default binary
CLIBuilt-in

Plus 70+ integrations referenced in documentation. The WhatsApp caveat is significant — it's not in the default release binary and lacks media attachment support.

Capabilities

Core:

  • Multi-channel messaging with persistent memory (SQLite + vector search)
  • Cron-style scheduler for recurring tasks
  • Web search and page fetching (with domain restrictions)
  • HTTP request tools
  • GPIO/hardware control (LEDs, sensors, motors, relays)
  • Agent orchestration and autonomous execution
  • Observability: Prometheus, OpenTelemetry, structured logging
  • zeroclaw migrate openclaw for migration from OpenClaw

Notable absences: Native file management, shell access, calendar, email, and smart home integrations are not documented as built-in. These require custom tool implementation.

Performance

This is where ZeroClaw dominates:

MetricZeroClawOpenClawNanoClaw (host)
Idle RAM~4 MB~1.2 GB~150 MB
Peak heap~12 MB~320 MB~200 MB + containers
Cold start<10 ms500ms–8s~500ms + container startup
Binary size3.4 MB298 MB–2.5 GB~50 MB (node_modules)
Threads per bot~7~20+~10 + container overhead
Throughput450 tasks/sec120 tasks/sec~100 tasks/sec
Bots on same hardware50–1004–510–15

ZeroClaw uses 300x less RAM than OpenClaw at idle. On a Raspberry Pi 4 (4GB), you can run 50–100 ZeroClaw bots versus 4–5 OpenClaw bots.

Setup

bash
# Homebrew
brew install zeroclaw

# Or one-line install
curl -fsSL https://raw.githubusercontent.com/zeroclaw-labs/zeroclaw/master/install.sh | bash

# Or cargo
cargo build --release --locked

Then:

bash
zeroclaw onboard --interactive  # 11-step wizard
# or
zeroclaw onboard --api-key sk-... --provider openrouter

Platform support:

  • Tier 1 (fully tested): Linux (Ubuntu 20.04+, Debian 11+, Fedora 35+), Windows 10/11, macOS 11+
  • Tier 2 (community-validated): Raspberry Pi OS, Alpine Linux (ARMv7/AArch64)

Community

  • 27.6k stars, 3.7k forks
  • Contributors from Harvard, MIT, Sundai.Club
  • Releases every 1–2 days
  • Active on X (@zeroclawlabs), Reddit (r/zeroclawlabs)
  • Website and Discord under development
  • Warning: Official only via GitHub — beware impersonation from zeroclaw.org/.net

ZeroClaw:Rust 效能純粹主義者

架構

ZeroClaw 是一個單一編譯的 Rust 二進位檔。沒有 Node.js、沒有 Python、沒有 runtime 直譯器。三個獨立服務:

┌──────────────────────────────────────────────┐
│ zeroclaw agent   — CLI 聊天介面               │
│ zeroclaw daemon  — 自主 runtime               │
│                    (systemd 管理)            │
│ zeroclaw gateway — Webhook 伺服器             │
│                    (127.0.0.1:42617)         │
│                    + Web 儀表板(:3000)        │
├──────────────────────────────────────────────┤
│ Tokio 非同步 runtime(work-stealing 執行器)   │
│ 每個 bot 約 7 個執行緒(OpenClaw 需 20+)      │
├──────────────────────────────────────────────┤
│ SQLite + 向量搜尋(70/30 混合)               │
│ ChaCha20-Poly1305 靜態加密                    │
│ Arena 分配,所有權型安全                       │
└──────────────────────────────────────────────┘

工作區: ~/.zeroclaw/workspace/ 包含 session、記憶、狀態、cron 任務、skill 和身份檔案(IDENTITY.mdAGENTS.mdSOUL.mdTOOLS.md)。

Trait 驅動設計: Provider、記憶後端、工具、頻道和通道都可以透過 Rust trait 替換——在型別層級沒有廠商鎖定。

安全模型

ZeroClaw 的安全論點:在編譯時透過 Rust 所有權系統消除整個漏洞類別,然後加密一切靜態資料。

五層安全:

機制
網路預設綁定 127.0.0.1,速率限制,64KB body 限制
認證6 位數 OTP 配對驗證
授權三個自主等級、指令白名單、網域限制
Runtime選用 Docker sandbox、唯讀 rootfs、記憶體/CPU 限制
資料ChaCha20-Poly1305 靜態加密;secret 絕不存在環境變數中

Rust 固有安全: 所有權系統在編譯時消除 buffer overflow、use-after-free 和 data race。這些是歷史上在系統軟體中產生 CVE 的漏洞類別。OpenClaw 有 9+ 個 CVE;ZeroClaw 有零個。

「Sovereign」模式: 所有 API key 保持在本地。不會聯繫外部編排服務。

誠實的限制: Hacker News 上的安全研究者認為這種方式「天真」,因為它專注於存取控制而沒有充分解決 prompt injection 和 AI 行為操縱問題。

LLM 支援(22+ Provider)

Provider備註
Anthropic / ClaudeAPI key 和 auth token
OpenAI包括 Codex(OAuth)
Google Gemini完整支援
OpenRouter多模型 gateway
GitHub Copilot透過 API
DeepSeek、Qwen、Groq支援
Ollama、LM Studio本地模型
任何 OpenAI 相容端點透過自訂設定

這是 ZeroClaw 對 NanoClaw 最大的優勢——真正的模型不可知支援,開箱即用 22+ 個 provider。

訊息平台(30+ 頻道)

平台狀態
Telegram內建,含語音
Discord內建
Slack內建
Matrix內建,含 E2EE
WhatsApp Web需要 --features whatsapp-web 編譯旗標;不在預設二進位檔中
CLI內建

文件中參考了 70+ 個整合。WhatsApp 的但書很重要——它不在預設 release 二進位檔中,且缺少媒體附件支援。

能力

核心:

  • 多頻道訊息,搭配持久化記憶(SQLite + 向量搜尋)
  • Cron 排程器用於循環任務
  • Web 搜尋和頁面擷取(有網域限制)
  • HTTP 請求工具
  • GPIO/硬體控制(LED、感測器、馬達、繼電器)
  • Agent 編排與自主執行
  • 可觀察性:Prometheus、OpenTelemetry、結構化日誌
  • zeroclaw migrate openclaw 從 OpenClaw 遷移

值得注意的缺失: 原生檔案管理、shell 存取、日曆、email 和智慧家庭整合沒有被記錄為內建功能。這些需要自訂工具實作。

效能

這是 ZeroClaw 稱霸的地方:

指標ZeroClawOpenClawNanoClaw(主機)
閒置 RAM約 4 MB約 1.2 GB約 150 MB
峰值 heap約 12 MB約 320 MB約 200 MB + 容器
冷啟動<10 ms500ms–8s約 500ms + 容器啟動
二進位大小3.4 MB298 MB–2.5 GB約 50 MB(node_modules)
每 bot 執行緒約 7約 20+約 10 + 容器開銷
吞吐量450 tasks/sec120 tasks/sec約 100 tasks/sec
同硬體 bot 數50–1004–510–15

ZeroClaw 閒置時使用比 OpenClaw 少 300 倍的 RAM。在 Raspberry Pi 4(4GB)上,你可以跑 50–100 個 ZeroClaw bot,而 OpenClaw 只能跑 4–5 個。

安裝

bash
# Homebrew
brew install zeroclaw

# 或一行安裝
curl -fsSL https://raw.githubusercontent.com/zeroclaw-labs/zeroclaw/master/install.sh | bash

# 或 cargo
cargo build --release --locked

然後:

bash
zeroclaw onboard --interactive  # 11 步精靈
# 或
zeroclaw onboard --api-key sk-... --provider openrouter

平台支援:

  • Tier 1(完整測試):Linux(Ubuntu 20.04+、Debian 11+、Fedora 35+)、Windows 10/11、macOS 11+
  • Tier 2(社群驗證):Raspberry Pi OS、Alpine Linux(ARMv7/AArch64)

社群

  • 27.6k 星、3.7k fork
  • 來自 Harvard、MIT、Sundai.Club 的貢獻者
  • 每 1–2 天發佈
  • 活躍於 X(@zeroclawlabs)、Reddit(r/zeroclawlabs)
  • 網站和 Discord 開發中
  • 注意:僅 GitHub 為官方——小心 zeroclaw.org/.net 的冒充

Head-to-Head Comparison

Security

DimensionNanoClawZeroClaw
Isolation modelOS-level containers (each group gets own container)Language-level (Rust ownership) + optional Docker
Attack surface~3,900 lines auditable + container runtime3.4 MB binary, <1% unsafe code
Secret storageEnv vars (stdin-passed, never on disk)ChaCha20-Poly1305 encrypted at rest
CVEs0 (too new to tell)0 (Rust eliminates common vulnerability classes)
Prompt injection defenseContainer limits blast radiusDomain restrictions + command allowlists
Supply chain riskNo marketplace (by design)No marketplace (by design)
Docker partnershipYes (Docker Sandboxes, hypervisor-level)No

Verdict: NanoClaw has stronger architectural isolation (every group in its own container). ZeroClaw has stronger language-level safety (Rust eliminates entire bug classes). Neither fully solves prompt injection.

Performance

MetricNanoClawZeroClawWinner
Host RAM~150 MB~4 MBZeroClaw (37x)
Cold start~500ms + container<10 msZeroClaw (50x+)
Binary/install size~50 MB3.4 MBZeroClaw (15x)
Bots per 4GB device10–1550–100ZeroClaw (5–7x)
Throughput~100 tasks/sec450 tasks/secZeroClaw (4.5x)

Verdict: ZeroClaw wins every performance metric. It's not close.

Capabilities

CapabilityNanoClawZeroClaw
WhatsAppBuilt-in, first-classRequires custom compilation
TelegramVia skillBuilt-in
DiscordBuilt-inBuilt-in
SlackBuilt-inBuilt-in
Matrix (E2EE)NoBuilt-in
GmailVia skillNot built-in
Smart HomeVia skill (Home Assistant)GPIO only (raw hardware)
Agent BrowserVia skillNot built-in
Voice transcriptionVia skill (Whisper)Via Telegram voice
Agent swarmsNative (first claw to support)Not documented
LLM providersClaude-optimized (~1 native)22+ providers
Scheduled tasksBuilt-inBuilt-in (cron)
ObservabilityBasicPrometheus, OpenTelemetry

Verdict: NanoClaw has more consumer-friendly features (WhatsApp, Gmail, Smart Home, browser). ZeroClaw has broader LLM support and better observability.

Developer Experience

AspectNanoClawZeroClaw
Setup timeMinutes (AI-guided)Minutes (wizard or one-liner)
Config files0 (AI-native)1 (TOML)
CustomizationTell Claude what you wantEdit TOML or implement Rust traits
Plugin modelSkills (AI modifies source code)Rust traits (compile-in)
Migration from OpenClawManualzeroclaw migrate openclaw built-in
Codebase readability8 minutes to read everythingRequires Rust expertise
Adding custom toolsAsk Claude to add itImplement Rust trait + recompile

Verdict: NanoClaw is radically easier to customize (just talk to Claude). ZeroClaw requires Rust knowledge but offers a proper migration path from OpenClaw.

正面對決

安全

維度NanoClawZeroClaw
隔離模型作業系統層級容器(每群組一個容器)語言層級(Rust 所有權)+ 選用 Docker
攻擊面約 3,900 行可審計 + 容器 runtime3.4 MB 二進位檔,<1% unsafe 程式碼
Secret 儲存環境變數(stdin 傳遞,不落磁碟)ChaCha20-Poly1305 靜態加密
CVE0(太新還看不出來)0(Rust 消除常見漏洞類別)
Prompt injection 防禦容器限制爆炸半徑網域限制 + 指令白名單
供應鏈風險沒有 marketplace(設計決策)沒有 marketplace(設計決策)
Docker 合作是(Docker Sandboxes,hypervisor 層級)

結論: NanoClaw 有更強的架構隔離(每個群組在自己的容器中)。ZeroClaw 有更強的語言層級安全(Rust 消除整個 bug 類別)。兩者都沒有完全解決 prompt injection。

效能

指標NanoClawZeroClaw勝者
主機 RAM約 150 MB約 4 MBZeroClaw(37 倍)
冷啟動約 500ms + 容器<10 msZeroClaw(50 倍以上)
二進位/安裝大小約 50 MB3.4 MBZeroClaw(15 倍)
每 4GB 設備 bot 數10–1550–100ZeroClaw(5–7 倍)
吞吐量約 100 tasks/sec450 tasks/secZeroClaw(4.5 倍)

結論: ZeroClaw 贏得每一個效能指標。差距不小。

能力

能力NanoClawZeroClaw
WhatsApp內建,一級支援需自訂編譯
Telegram透過 skill內建
Discord內建內建
Slack內建內建
Matrix(E2EE)內建
Gmail透過 skill非內建
Smart Home透過 skill(Home Assistant)僅 GPIO(原始硬體)
Agent Browser透過 skill非內建
語音轉錄透過 skill(Whisper)透過 Telegram 語音
Agent swarm原生(第一個支援的 claw)未記錄
LLM providerClaude 優化(約 1 個原生)22+ provider
排程任務內建內建(cron)
可觀察性基本Prometheus、OpenTelemetry

結論: NanoClaw 有更多消費者友善功能(WhatsApp、Gmail、Smart Home、瀏覽器)。ZeroClaw 有更廣的 LLM 支援和更好的可觀察性。

開發者體驗

面向NanoClawZeroClaw
設定時間幾分鐘(AI 引導)幾分鐘(精靈或一行指令)
設定檔0(AI 原生)1(TOML)
自訂告訴 Claude 你想要什麼編輯 TOML 或實作 Rust trait
Plugin 模型Skill(AI 修改原始碼)Rust trait(編譯進去)
從 OpenClaw 遷移手動內建 zeroclaw migrate openclaw
Codebase 可讀性8 分鐘讀完一切需要 Rust 專業知識
新增自訂工具叫 Claude 加上去實作 Rust trait + 重新編譯

結論: NanoClaw 自訂起來激進地簡單(跟 Claude 說就好)。ZeroClaw 需要 Rust 知識,但提供從 OpenClaw 遷移的正式路徑。


When to Choose NanoClaw

Choose NanoClaw if:

  1. WhatsApp is your primary channel — NanoClaw has the strongest WhatsApp integration. ZeroClaw requires custom compilation and lacks media attachments.

  2. You want the strongest architectural isolation — Every chat group gets its own container with its own kernel (Docker Sandboxes). A compromised agent in Group A cannot access Group B's data.

  3. You're a Claude-only user — If you exclusively use Anthropic's Claude, NanoClaw's Claude-optimized design is a feature, not a limitation.

  4. You want to customize without coding — NanoClaw's "AI-native" approach means you tell Claude Code what you want and it modifies the codebase. No config files, no Rust compilation.

  5. You need agent swarms — NanoClaw is the first claw platform to support multi-agent collaboration with individual bot identities (Telegram Swarm).

  6. You care about auditability — 3,900 lines. 15 files. One sitting. You can personally verify every line of code that touches your data.

  7. You want smart home control — Home Assistant integration via skill. ZeroClaw only has raw GPIO.

NanoClaw sweet spot: Personal WhatsApp/Telegram assistant for someone who uses Claude, wants strong security guarantees, and values simplicity over breadth.

什麼時候選 NanoClaw

在以下情況選擇 NanoClaw:

  1. WhatsApp 是你的主要頻道 —— NanoClaw 有最強的 WhatsApp 整合。ZeroClaw 需要自訂編譯且缺少媒體附件支援。

  2. 你想要最強的架構隔離 —— 每個聊天群組有自己的容器和自己的 kernel(Docker Sandboxes)。Group A 中被入侵的 agent 無法存取 Group B 的資料。

  3. 你只用 Claude —— 如果你專門使用 Anthropic 的 Claude,NanoClaw 的 Claude 優化設計是功能,不是限制。

  4. 你想不寫程式碼就自訂 —— NanoClaw 的「AI 原生」方式意味著你告訴 Claude Code 你想要什麼,它就修改 codebase。沒有設定檔,不用編譯 Rust。

  5. 你需要 agent swarm —— NanoClaw 是第一個支援多 agent 協作、各有獨立 bot 身份的 claw 平台(Telegram Swarm)。

  6. 你在意可審計性 —— 3,900 行。15 個檔案。一次坐下來就能讀完。你可以親自驗證每一行碰到你資料的程式碼。

  7. 你想要智慧家庭控制 —— 透過 skill 整合 Home Assistant。ZeroClaw 只有原始 GPIO。

NanoClaw 最佳場景: 給使用 Claude、想要強安全保障、重視簡潔勝過廣度的人,做為個人 WhatsApp/Telegram 助手。


When to Choose ZeroClaw

Choose ZeroClaw if:

  1. You need to run on constrained hardware — Raspberry Pi, edge devices, IoT boards. 4 MB RAM and 3.4 MB binary. NanoClaw needs Docker + Node.js, which is heavy for a Pi Zero.

  2. You want model freedom — 22+ LLM providers out of the box. Switch between Claude, GPT, Gemini, DeepSeek, Qwen, local Ollama models without middleware.

  3. You're hosting many bots — 50–100 concurrent bots on the same hardware. NanoClaw tops out at 10–15. If you're running a service for multiple users, ZeroClaw's density is unbeatable.

  4. Matrix with E2EE is important — Built-in Matrix support with end-to-end encryption. NanoClaw doesn't have this.

  5. You're migrating from OpenClawzeroclaw migrate openclaw converts configs automatically. NanoClaw requires manual migration.

  6. You need production observability — Prometheus metrics, OpenTelemetry tracing, structured logging built in. NanoClaw has only basic diagnostics.

  7. You want encrypted secrets at rest — ZeroClaw encrypts all secrets with ChaCha20-Poly1305. NanoClaw passes secrets via stdin/env vars.

  8. You're comfortable with Rust — Adding custom tools means implementing Rust traits and recompiling. If you know Rust, this is powerful. If you don't, it's a wall.

ZeroClaw sweet spot: Multi-bot deployment on resource-constrained or edge hardware, for someone who values LLM flexibility and production-grade observability.

什麼時候選 ZeroClaw

在以下情況選擇 ZeroClaw:

  1. 你需要在受限硬體上運行 —— Raspberry Pi、邊緣設備、IoT 開發板。4 MB RAM 和 3.4 MB 二進位檔。NanoClaw 需要 Docker + Node.js,對 Pi Zero 來說太重了。

  2. 你想要模型自由 —— 開箱即用 22+ 個 LLM provider。在 Claude、GPT、Gemini、DeepSeek、Qwen、本地 Ollama 模型之間切換,不需要中介軟體。

  3. 你要託管很多 bot —— 同一硬體上 50–100 個並行 bot。NanoClaw 上限是 10–15 個。如果你為多個使用者運行服務,ZeroClaw 的密度無可匹敵。

  4. Matrix 加 E2EE 很重要 —— 內建 Matrix 支援,含端對端加密。NanoClaw 沒有這個。

  5. 你正在從 OpenClaw 遷移 —— zeroclaw migrate openclaw 自動轉換設定。NanoClaw 需要手動遷移。

  6. 你需要 production 可觀察性 —— 內建 Prometheus metrics、OpenTelemetry tracing、結構化日誌。NanoClaw 只有基本診斷。

  7. 你想要靜態加密的 secret —— ZeroClaw 用 ChaCha20-Poly1305 加密所有 secret。NanoClaw 透過 stdin/env var 傳遞 secret。

  8. 你對 Rust 熟悉 —— 新增自訂工具意味著實作 Rust trait 並重新編譯。如果你懂 Rust,這很強大。如果不懂,這是一堵牆。

ZeroClaw 最佳場景: 在資源受限或邊緣硬體上的多 bot 部署,適合重視 LLM 靈活性和 production 等級可觀察性的人。


The Maturity Warning (Both Projects)

Both projects are extremely young:

NanoClawZeroClaw
Age~7 weeks~13 months
VersionNo semver (tracks codebase size)v0.1.6
Integration testsNot documented3
Known code quality issuesMarkdown code block bug in skills261 .unwrap() calls across 80 files
Enterprise featuresNone (no SSO, RBAC, audit logging)None
Horizontal scalingSingle-node onlySingle-node only

Practical advice:

  1. Don't run either in production for critical business workflows yet
  2. Back up your data — both store state locally (~/.nanoclaw/ or ~/.zeroclaw/)
  3. Pin versions — both are releasing at breakneck speed
  4. Monitor agent behavior — neither has solved prompt injection
  5. Start with one bot — observe before scaling

成熟度警告(兩個專案)

兩個專案都極度年輕

NanoClawZeroClaw
年齡約 7 週約 13 個月
版本無 semver(追蹤 codebase 大小)v0.1.6
整合測試未記錄3 個
已知程式碼品質問題Skill 中的 Markdown code block bug80 個檔案中有 261 個 .unwrap() 呼叫
企業功能無(沒有 SSO、RBAC、稽核日誌)
水平擴展僅單節點僅單節點

實用建議:

  1. 還不要在關鍵業務工作流中用於 production
  2. 備份你的資料 —— 兩者都在本地儲存狀態(~/.nanoclaw/~/.zeroclaw/
  3. 鎖定版本 —— 兩者都在飛速發佈
  4. 監控 agent 行為 —— 兩者都沒有解決 prompt injection
  5. 從一個 bot 開始 —— 觀察後再擴展

Decision Flowchart

Is WhatsApp your primary channel?
├── Yes → NanoClaw
└── No
    ├── Running on Raspberry Pi or edge hardware?
    │   ├── Yes → ZeroClaw
    │   └── No
    │       ├── Need 22+ LLM providers?
    │       │   ├── Yes → ZeroClaw
    │       │   └── No (Claude-only)
    │       │       ├── Need agent swarms?
    │       │       │   ├── Yes → NanoClaw
    │       │       │   └── No
    │       │       │       ├── Value auditability over features?
    │       │       │       │   ├── Yes → NanoClaw
    │       │       │       │   └── No → ZeroClaw
    │       │       │       └──
    │       │       └──
    │       └──
    └──

Both are legitimate, well-engineered projects with growing communities. The "right" choice depends entirely on your priorities: isolation and simplicity (NanoClaw) or performance and flexibility (ZeroClaw).

決策流程圖

WhatsApp 是你的主要頻道嗎?
├── 是 → NanoClaw
└── 否
    ├── 在 Raspberry Pi 或邊緣硬體上運行?
    │   ├── 是 → ZeroClaw
    │   └── 否
    │       ├── 需要 22+ 個 LLM provider?
    │       │   ├── 是 → ZeroClaw
    │       │   └── 否(只用 Claude)
    │       │       ├── 需要 agent swarm?
    │       │       │   ├── 是 → NanoClaw
    │       │       │   └── 否
    │       │       │       ├── 重視可審計性勝過功能?
    │       │       │       │   ├── 是 → NanoClaw
    │       │       │       │   └── 否 → ZeroClaw
    │       │       │       └──
    │       │       └──
    │       └──
    └──

兩者都是合法、工程品質良好、社群持續成長的專案。「正確」的選擇完全取決於你的優先順序:隔離與簡潔(NanoClaw)或效能與靈活性(ZeroClaw)。