
Last update: 2/6/2026
By The PAI Team
Listen, we know why you’re here. You’ve seen the metrics: 150k GitHub stars in ten weeks is absurd growth. You’ve heard the rumors about OpenClaw (formerly known as WhatsApp Relay, Clawdbot, or Moltbot).
This isn't just another chatbot wrapper. It is a local-first Agent that has persistent memory, access to your file system, and can drive a browser. It’s the closest thing to "Jarvis" we have right now.
But here is the reality check:
This tool is a double-edged sword. As noted by security researchers, OpenClaw is a potential security nightmare if misconfigured. You are essentially giving an LLM sudo access to your life.
We are going to set this up fast, but we are going to do it safely.

By the end of this guide, you will have a persistent AI Agent running on your local machine that you can text via Telegram. It will remember your previous conversations and be able to execute code locally.
The End State:
Don't start until you have these ready. We hate context switching.
OpenClaw moves fast. The only reliable way to install it is the official bootstrap script. Open your terminal:
bash
What this does: Detects your OS, installs dependencies, and launches the Terminal User Interface (TUI).
The TUI will launch. Do not try to be a hero and choose "Advanced" yet.
⚠️ Security Note: This key is stored locally in ~/.openclaw/config.json.
OpenClaw needs a "body" to talk to you. Telegram is the path of least resistance.
TEXT
Once the TUI says "Gateway Connected," send a "Hello" to your new bot on Telegram. If it replies, you are live.
Most devs treat this like ChatGPT—a stateless session. Stop doing that.
OpenClaw has Episodic Memory. It stores context as structured JSON/Markdown locally on your disk. It doesn't just "remember" the chat; it builds a knowledge graph.
Try this workflow:
It will use React and Tailwind automatically. This is where the real productivity gain happens—you stop repeating your prompts.
This is where most developers get burned. We analyzed the recent security reports, and here is what you need to know to avoid getting pwned.
There is a high-severity flaw involving the Control UI. A bug in OpenClaw enables one-click Remote Code Execution via WebSocket hijacking.
The Fix: Do NOT expose the Gateway port to the internet. Bind it to 127.0.0.1. If you need remote access, use a VPN (Tailscale/WireGuard), never port forwarding.
OpenClaw has a skill store called "ClawHub." Treat this like npm in 2016 but worse. Researchers have found hundreds of malicious skills in ClawHub designed to steal crypto credentials and API keys.
The Fix: Audit every skill .md file before you install it. Do not install the "Crypto Ticker" or "Social Media Manager" skills unless you wrote them yourself. This is a classic vector for data poisoning.
Do not install this on your corporate laptop without explicit permission. OpenClaw bypasses DLP because it reads local files and sends tokens to LLM providers. If you feed it proprietary code, you are exfiltrating data. Security teams can see the traffic pattern, and they will find you.
You have it running on your laptop. Now you want it running 24/7.
OpenClaw is powerful because it breaks the rules of traditional sandboxing. That is its feature and its bug. Respect the tool, and it will serve you well.
Now, go build something.
📩 Stay Updated: For more deep dives into AI security and agent architecture, subscribe to our newsletter.