March 18, 2026
NemoClaw Is a Guardrail. It's Not an Assessment.
Matt Sikes, Principal Architect, TrustTrace
NVIDIA announced NemoClaw at GTC 2026 last week. If you're building or securing AI agents in production, you need to understand what it does, what it doesn't do, and what the distinction means for your security program.
What NemoClaw Actually Is
NemoClaw is a software stack that integrates with OpenClaw and installs in a single command. The core component is OpenShell, an open-source runtime that sandboxes agents at the process level. Administrators write YAML-based policies defining which files an agent can access, which network connections it can make, and which cloud services it can call.
It is currently early-stage alpha. NVIDIA's own documentation warns to expect rough edges.
For enterprises waiting for a credible way to run OpenClaw agents in production, this is a meaningful step. The zero-permissions-by-default model in OpenShell addresses real structural weaknesses in OpenClaw's original design.
The Gap NemoClaw Doesn't Close
OpenShell enforces the policy you wrote. It has no opinion on whether the policy you wrote is correct, complete, or aligned with your actual threat model. That is a fundamentally different problem, and the one that causes incidents.
NemoClaw does not provide: multi-tenant governance, PII detection, content safety guardrails, cost attribution, or compliance audit trails. It does not cover retroactive exposure. If OpenClaw has been running in your environment for weeks, NemoClaw's policy enforcement starts at installation.
More importantly, NemoClaw is OpenClaw-specific. The enterprise AI agent landscape is not. Organizations running LangChain, LangGraph, AutoGen, CrewAI, or custom FastAPI-based agent pipelines are outside NemoClaw's scope entirely.
What This Means For Your Security Program
The OWASP LLM Top 10 does not stop applying because you installed OpenShell. Tool poisoning, prompt injection via MCP tool descriptions, confused deputy attacks, credential stratification failures, and missing audit middleware are all design and configuration vulnerabilities that exist above the sandbox layer.
The CoSAI MCP Security whitepaper, published in January 2026 by a working group including Anthropic, Google, IBM, Microsoft, and NVIDIA, identifies twelve threat categories and nearly forty distinct threats in MCP-based agentic deployments. NemoClaw was built before that taxonomy was finalized. Its YAML policy model addresses network isolation and file access. That maps to T7 and T8 in the CoSAI framework. The other ten categories remain the organization's responsibility to assess and mitigate.
The Right Sequence
NemoClaw and a security assessment are not competing choices. They are sequential steps. You deploy guardrails to enforce a security posture. You run an assessment to verify that the posture you've enforced actually protects you.
Installing NemoClaw without an assessment is the equivalent of deploying a firewall without a penetration test. The firewall is necessary. It is not sufficient.
If you want to understand what a structured assessment covers, and what NemoClaw leaves open, the OWASP LLM Top 10 and the CoSAI MCP Security whitepaper are the right starting points. Both are public. Both are free.
If you want someone to run that assessment against your specific deployment and produce a written report your security team can act on, that's what TrustTrace is built for.