create-new-openclaw-in-gcpDeploy and configure an OpenClaw instance on a GCP VM with Tailscale networking, Brave Search integration, and secure credential handling.
Install via ClawdBot CLI:
clawdbot install Divide-By-0/create-new-openclaw-in-gcpDeploy OpenClaw to GCP with Tailscale and Brave Search.
export OPENCLAW_PROJECT_ID="your-gcp-project"
export OPENCLAW_USERNAME="your-ssh-username"
export ANTHROPIC_TOKEN="sk-ant-oat01-..." # Keep secret
export BRAVE_API_KEY="..." # Keep secret
chmod +x openclaw-quick-setup.sh
./openclaw-quick-setup.sh
# Set variables first (see above)
ZONE="us-central1-a"
VM="openclaw"
# Create VM
gcloud compute instances create "$VM" \
--project="$OPENCLAW_PROJECT_ID" --zone="$ZONE" \
--machine-type=e2-medium \
--image-family=debian-12 --image-project=debian-cloud \
--boot-disk-size=10GB \
--metadata=ssh-keys="${OPENCLAW_USERNAME}:$(cat ~/.ssh/id_ed25519.pub)"
IP=$(gcloud compute instances describe "$VM" \
--project="$OPENCLAW_PROJECT_ID" --zone="$ZONE" \
--format='get(networkInterfaces[0].accessConfigs[0].natIP)')
# Wait for SSH, then run setup
sleep 30
ssh -o StrictHostKeyChecking=no "${OPENCLAW_USERNAME}@${IP}" "
set -euo pipefail
sudo apt-get update && sudo apt-get install -y git curl ufw jq
curl -fsSL https://tailscale.com/install.sh | sh
"
# Manual: authorize Tailscale
ssh "${OPENCLAW_USERNAME}@${IP}" "sudo tailscale up"
# Continue setup
ssh "${OPENCLAW_USERNAME}@${IP}" "
set -euo pipefail
sudo ufw allow 22/tcp && sudo ufw allow in on tailscale0 && echo y | sudo ufw enable
echo 'nameserver 8.8.8.8' | sudo tee -a /etc/resolv.conf
curl -o- https://raw.githubusercontent.com/nvm-sh/nvm/v0.40.1/install.sh | bash
source ~/.nvm/nvm.sh && nvm install 22
source ~/.nvm/nvm.sh && npm install -g openclaw@latest
"
# Configure OpenClaw (credentials via stdin)
ssh "${OPENCLAW_USERNAME}@${IP}" '
source ~/.nvm/nvm.sh
openclaw onboard --non-interactive --accept-risk \
--auth-choice token --token-provider anthropic \
--token "$(cat)" --gateway-bind loopback --install-daemon
' <<< "$ANTHROPIC_TOKEN"
# Add Brave key + enable Tailscale auth
ssh "${OPENCLAW_USERNAME}@${IP}" "
set -euo pipefail
mkdir -p ~/.config/systemd/user/openclaw-gateway.service.d
cat > ~/.config/systemd/user/openclaw-gateway.service.d/brave.conf << CONF
[Service]
Environment=\"BRAVE_API_KEY=\$(cat)\"
CONF
chmod 600 ~/.config/systemd/user/openclaw-gateway.service.d/brave.conf
systemctl --user daemon-reload
source ~/.nvm/nvm.sh
jq '.gateway.auth.allowTailscale = true' ~/.openclaw/openclaw.json > /tmp/oc.json
mv /tmp/oc.json ~/.openclaw/openclaw.json
chmod 600 ~/.openclaw/openclaw.json
openclaw gateway restart
sudo tailscale serve --bg 18789
" <<< "$BRAVE_API_KEY"
# Get dashboard URL
ssh "${OPENCLAW_USERNAME}@${IP}" "tailscale serve status"
# After first browser access, approve device
ssh "${OPENCLAW_USERNAME}@${IP}" 'source ~/.nvm/nvm.sh && openclaw devices list'
# Then: openclaw devices approve <REQUEST_ID>
| Issue | Solution |
|-------|----------|
| e2-micro OOM | Use e2-medium (4GB minimum) |
| nodesource failures | Use nvm for Node.js 22 |
| DNS broken after Tailscale | Add 8.8.8.8 to /etc/resolv.conf |
| Brave key in config rejected | Use systemd env var drop-in |
| Dashboard "pairing required" | Run openclaw devices approve |
<<<), not command-line argschmod 600Generated Mar 1, 2026
A research team needs a secure, isolated environment to deploy an AI agent for experimental tasks. This skill sets up OpenClaw on a GCP VM with Tailscale for private networking, ensuring data privacy and controlled access. It's ideal for testing AI models without exposing sensitive credentials or APIs to the public internet.
A startup wants to quickly deploy an AI customer support agent using OpenClaw to handle inquiries via a private dashboard. This skill automates the setup on GCP with secure credential handling and integrates Brave Search for real-time data, enabling rapid prototyping and scaling without infrastructure overhead.
An educational institution runs a workshop where students deploy AI agents in a cloud environment. This skill provides a step-by-step guide to set up OpenClaw on GCP, teaching concepts like VM management, secure networking with Tailscale, and API integration in a hands-on, reproducible manner.
A company deploys OpenClaw as an internal automation tool for tasks like data analysis or report generation. The skill ensures secure access via Tailscale, with UFW firewall rules and credential protection, making it suitable for handling proprietary business data without external exposure.
A freelancer or indie developer uses this skill to create a personal AI development sandbox on GCP. It allows quick iteration on AI projects with OpenClaw, integrating Anthropic and Brave APIs securely, and managing costs with scalable VM resources for solo or small-team projects.
Offer a managed service where customers pay a subscription to deploy and maintain OpenClaw instances on GCP using this skill. Revenue comes from monthly fees covering VM costs, setup automation, and ongoing support, targeting businesses that lack in-house DevOps expertise.
Provide consulting services to help organizations customize and integrate this OpenClaw setup into their existing workflows. Revenue is generated through project-based fees for tailoring the deployment, adding features, or ensuring compliance with specific security standards.
Host paid workshops or online courses teaching users how to deploy AI agents using this skill. Revenue comes from enrollment fees, with materials covering GCP, Tailscale, and OpenClaw setup, aimed at developers, students, or professionals looking to upskill in cloud AI.
💬 Integration Tip
Ensure all environment variables are set securely before running scripts, and verify Tailscale authorization manually to avoid setup failures. Use the provided security notes to maintain credential safety.
Transform AI agents from task-followers into proactive partners that anticipate needs and continuously improve. Now with WAL Protocol, Working Buffer, Autonomous Crons, and battle-tested patterns. Part of the Hal Stack 🦞
Use the ClawdHub CLI to search, install, update, and publish agent skills from clawdhub.com. Use when you need to fetch new skills on the fly, sync installed skills to latest or a specific version, or publish new/updated skill folders with the npm-installed clawdhub CLI.
Clawdbot documentation expert with decision tree navigation, search scripts, doc fetching, version tracking, and config snippets for all Clawdbot features
Interact with Moltbook social network for AI agents. Post, reply, browse, and analyze engagement. Use when the user wants to engage with Moltbook, check their feed, reply to posts, or track their activity on the agent social network.
OpenClaw CLI wrapper — gateway, channels, models, agents, nodes, browser, memory, security, automation.
MoltGuard — runtime security plugin for OpenClaw agents by OpenGuardrails. Helps users install, register, activate, and check the status of MoltGuard. Use wh...