Skip to content
API Blog

Comparison

See also: Capabilities and Skills.

Lobu and OpenClaw are complementary, but they solve different layers of the problem.

  • OpenClaw provides the agent runtime — the AI execution engine that runs tools, manages sessions, and talks to LLM providers.
  • Lobu provides deployment, orchestration, isolation, and multi-platform delivery around that runtime.

OpenClaw is a powerful runtime (~800k lines of code), but it was designed as a single-tenant, single-user system — by design. The creator of OpenClaw, Peter Steinberger, has been explicit about this:

OpenClaw assumes one user runs one agent on their own machine. That’s great for local development, but production deployments need:

  • Multi-tenant isolation — every user gets their own sandboxed worker, not a shared process.
  • Platform routing — messages arrive from Slack, Telegram, WhatsApp, or REST API and need to reach the right worker.
  • Credential separation — workers must never see real API keys. The gateway proxies all provider calls and injects credentials at the edge.
  • Network control — workers run on an isolated internal network with no direct internet access. The gateway is the single egress point with domain-level allowlists.
  • Scale-to-zero — idle workers shut down and wake on demand, so you only pay for active compute.

OpenClaw doesn’t have opinions about any of this. Lobu does.

The Lobu gateway is an entirely separate codebase — not a fork or wrapper around OpenClaw’s server. It handles:

  1. Platform adapters — Slack (Events API + Socket Mode), Telegram (Grammy long-polling), WhatsApp (Cloud API webhooks), and a REST endpoint for programmatic access.
  2. Worker lifecycle — spawning, routing, health checks, idle timeouts, persistent volumes, and cleanup.
  3. Auth & secrets — device-code auth for MCP servers, provider key resolution by agent ID, and a settings UI per user. Third-party API auth is handled by Owletto.
  4. Proxy layer — an HTTP proxy (port 8118) that enforces domain allowlists at the network layer. Workers send all outbound traffic through this proxy.
  5. Skills registry — a curated catalog of MCP servers and LLM providers that workers can use, managed via lobu.toml and the settings page.

OpenClaw runs inside each worker as the agent execution engine. Everything outside the worker boundary is Lobu.

Inside each worker, Lobu runs OpenClaw sessions and tool execution.

  1. Gateway receives user messages (Slack/Telegram/WhatsApp/API).
  2. Gateway routes jobs to isolated worker instances.
  3. Worker executes with OpenClaw using Lobu’s tool policy and workspace model.
  4. Gateway streams responses and manages auth/secrets. Integration OAuth is handled by Owletto.
CapabilityLobuOpenClaw
Runtime engineUses OpenClaw in workersNative runtime
ArchitectureMulti-tenant gateway + isolated workersSingle-tenant, single-user
Platform deliverySlack, Telegram, WhatsApp, REST APICLI and API
Worker isolationSandboxed containers, no direct internetRuns on host
Secret handlingGateway proxy injects credentialsDirect env vars
Egress controlDomain allowlists via HTTP proxyHost network
Scale-to-zeroBuilt-in idle timeout and wakeAlways running
DeploymentDocker Compose or KubernetesSingle process

Using Lobu with OpenClaw gives you:

  • OpenClaw’s agent runtime capabilities (tool use, sessions, LLM integration)
  • Lobu’s production concerns: isolation, routing, persistence, multi-tenant operations, and controlled network/auth boundaries

You get the full power of the OpenClaw runtime without having to build the infrastructure to run it safely for multiple users.