A key benefit of using this template is that it comes with built-in skills to work with Blaxel sandboxes, including starting and stopping them, writing and running code in them, and creating preview URLs. This makes it easy to explore OpenClaw’s capabilities safely, as all operations (such as arbitrary code generation and execution) can be performed in a secure, isolated Blaxel sandbox with zero additional configuration.
Prerequisites
Before starting, ensure you have:- a Blaxel account at Tier 2 or higher
- an API key from any of the supported model providers
Configure the OpenClaw agent template
-
Download and install the Blaxel CLI and log in to your Blaxel account:
-
Clone the agent template:
-
Copy the
.env.examplefile to.env: -
Update the
.envfile with the following configuration values:OPENCLAW_GATEWAY_TOKEN: Set the token to authenticate with the OpenClaw Gateway. Use a random hard-to-guess value.OPENCLAW_MODEL: Set the model to use, such asanthropic/claude-opus-4-6.ANTHROPIC_API_KEY,GEMINI_API_KEYorOPENAI_API_KEY: Set the model API key.
Deploy the agent
The template exposes the OpenClaw Gateway at a publicly accessible endpoint with no authentication or access controls enabled by default. If you require restricted access, you must deploy the agent behind an authentication/authorization layer (for example, API gateway, reverse proxy, or custom authentication middleware) before exposing the URL.Although the OpenClaw Gateway endpoint is publicly accessible by default, agent access still requires the correct OpenClaw Gateway token. You can configure the token after accessing the OpenClaw Gateway, using the value set in the
.env file in the previous step.For additional protection, you may configure the OpenClaw Gateway as private in the agent’s deployment manifest. However, if you do this, you will not be able to access the user interface directly. In this case, you have two options:- Use a browser extension to automatically attach the required authentication headers to your requests when accessing OpenClaw on Blaxel’s domain.
- Configure your own domain to proxy requests to Blaxel’s domain and inject the required authentication header at the proxy layer, eliminating the need for a browser extension.
-
Deploy the agent:
-
Browse to the “Curl” URL shown at the end of the deployment output.
This displays the OpenClaw Control UI.
-
Navigate to the Overview page of the OpenClaw Control UI. Enter the dashboard token configured earlier in the Gateway Token field. Click Connect.


Test OpenClaw
Navigate to the Chat page, enter a prompt, and wait for a reply to confirm that the OpenClaw agent is working. You will be asked a few setup questions to provision the agent.

Configure OpenClaw channels
OpenClaw supports multiple channels. To enable them, set the relevant environment variable and redeploy. For example, for Telegram:- Add the token to the
.envfile:TELEGRAM_BOT_TOKEN=123456:ABC-DEF... - Redeploy:
bl deploy
openclaw.json config in entrypoint.sh.