Deploy vercel-openclaw from the command line.
npx @vercel/vclaw createvclaw clones OpenClaw, links a Vercel project, provisions Redis, pushes managed env vars, deploys to production, and runs launch verification.
Get a token from @BotFather (/newbot), then:
npx @vercel/vclaw create --telegram "123456:AA...BotFatherToken"Same flow as above, plus registers the Telegram webhook after verify — no admin-panel clicks.
npx @vercel/vclaw --help- Node.js
>=20,git - Vercel CLI:
npm i -g vercel - Logged in via
vercel login(orVERCEL_TOKEN)
Check with:
npx @vercel/vclaw doctorPick a team or project name:
npx @vercel/vclaw create --scope my-team --name my-openclaw --telegram "<token>"Add Slack alongside Telegram (both require the signing secret from your Slack app):
npx @vercel/vclaw create \
--telegram "<token>" \
--slack "xoxb-..." \
--slack-signing-secret "abcd1234..."Enable Vercel Deployment Protection (auto-wires the automation bypass):
npx @vercel/vclaw create --telegram "<token>" --deployment-protection ssoStop before deploying:
npx @vercel/vclaw create --skip-deploy--name <name> Vercel project name (default: openclaw)
--scope <scope> Vercel team scope
--dir <path> Clone destination (default: ./vercel-openclaw)
--admin-secret <hex> Admin-dashboard password (prompted if omitted)
--cron-secret <hex> Optional dedicated cron secret
--deployment-protection <mode> none | sso | password
--protection-bypass-secret <s> Optional automation bypass secret
--skip-deploy Stop after provisioning
--telegram <botToken> Wire a Telegram bot after verify
--slack <botToken> Wire a Slack bot (requires --slack-signing-secret)
--slack-signing-secret <secret> Slack signing secret (paired with --slack)
--yes Skip confirmation prompts where possible
--telegram and --slack are mutually exclusive with --skip-deploy.
Run launch verification against an existing deployment:
npx @vercel/vclaw verify --url https://my-openclaw.vercel.app --admin-secret "$ADMIN_SECRET"Add --protection-bypass "$VERCEL_AUTOMATION_BYPASS_SECRET" for protected deployments.
Check local prerequisites and Vercel auth.
vclaw sets:
ADMIN_SECRET— the admin-dashboard passwordCRON_SECRET— when--cron-secretis passedVERCEL_AUTOMATION_BYPASS_SECRET— when deployment protection is enabled
Redis (REDIS_URL / KV_URL) comes from the Vercel Marketplace integration.
- GitHub:
vercel-labs/vclaw - Source project:
vercel-labs/vercel-openclaw
MIT