Beginner
macOS / Linux / Windows (WSL2) / Docker / VPS
Estimated time: 12 min

OpenClaw Starter Config Presets: 3 Safe Baselines You Can Actually Run

Download a conservative openclaw.json preset for local, coding, or remote dashboard access. Start with a small blast radius, then verify with a minimal probe loop before you add channels, skills, or automation.

Implementation Steps

Choose the smallest blast radius that still matches your goal, then download the matching template.

Most OpenClaw “it doesn’t work” reports are not deep bugs. They are too much, too soon:

  • remote dashboard access before auth is stable,
  • a tool profile that blocks the thing you expect,
  • channels enabled before you can probe the model path,
  • or a config edited without a rollback and a validation loop.

This guide gives you three starter presets that keep your blast radius small and your verification path obvious.

If you want the broader mental model (and more fix pages), keep these nearby:


0) Pick your preset (do not start from “full”)

Download one:

  1. Local + safe messaging-first (recommended)
  2. Local + coding machine
  3. Remote dashboard access (LAN/tailnet)

Remote access gotchas are real. If the Control UI “worked, then broke” after you changed how you reach it, read:


1) Install the preset (backup first, always)

On the gateway host, back up your current config:

cp ~/.openclaw/openclaw.json ~/.openclaw/openclaw.json.bak.$(date +%Y%m%d-%H%M%S) 2>/dev/null || true

Then replace ~/.openclaw/openclaw.json with the template you chose.

If you are not sure where your active config lives (service vs shell vs profile overrides), start here:


2) Make auth reproducible (this prevents “dashboard unauthorized” loops)

All three presets use token auth via env var:

  • OPENCLAW_GATEWAY_TOKEN

Set it in the environment that actually runs the gateway:

  • foreground debugging shell (fast, but not persistent), or
  • systemd/launchd service env (persistent), or
  • Docker/PaaS env settings (persistent).

Quick test (foreground shell only):

export OPENCLAW_GATEWAY_TOKEN='your-long-random-token'

Then confirm the gateway sees it:

openclaw doctor
openclaw config validate

If your config uses ${OPENCLAW_GATEWAY_TOKEN} but the service still behaves unauthenticated, you are debugging env propagation, not JSON.

Deep dive:


3) Restart and verify (the minimal probe loop)

After swapping presets, restart the gateway and prove the basics:

openclaw doctor
openclaw gateway restart
openclaw gateway status

Then probe the two paths that most often “look fine” until you test them:

openclaw models status --probe
openclaw channels status --probe

Finally, open the dashboard the right way (tokenized URL):

openclaw dashboard

If you see unauthorized or pairing required (1008) loops, do not keep regenerating tokens. Fix the access path + device approval layer:


4) Expand deliberately (the rule that keeps you sane)

Once the preset is stable, expand in this order:

  1. One model path (verify models status --probe first)
  2. One channel (verify channels status --probe and a real send)
  3. One extra capability (tools profile, a plugin, a node host, or automation)

If you broaden tools and suddenly the agent “only chats”, that is usually tools.profile drift:

If your goal is “coding + exec”, do approvals deliberately instead of guessing:

Verification & references

  • Reviewed by:CoClaw Editorial Team
  • Last reviewed:March 14, 2026
  • Verified on: macOS · Linux · Windows (WSL2) · Docker · VPS

Related Resources

Need live assistance?

Ask in the community forum or Discord support channels.

Get Support