Hardened by design
Secure defaults, credential handling, and policy boundaries are treated as first-class concerns.
Stable release
Carapace runs local-first, keeps security controls explicit, and gives you auditable behavior across chat channels and guarded local workspace tools. Works through Signal, Telegram, Discord, Slack, webhooks, and console.
Run setup, choose your first outcome, then start Carapace:
cara setup
cara
Want a quick security comparison? Carapace vs OpenClaw threat-by-threat table .
New here? Follow the full path: Install -> First Run -> Security -> Ops -> Cookbook.
Carapace ships a stable release line for its verified paths. Partial and in-progress areas are called out explicitly in the docs and feature status.
If you are unsure which first path to choose, start with one provider and
local-chat, then add channels after
cara verify --outcome auto passes.
Want a local project assistant? Enable filesystem for one
workspace root and start with the
guarded local project assistant recipe.
Use the public help paths for setup blockers, cookbook gaps, or a small-team evaluation. Keep secrets and sensitive details out of public issues.
Use task-focused recipes instead of piecing setup together manually.
Want a missing recipe? Request one here .
Secure defaults, credential handling, and policy boundaries are treated as first-class concerns.
Enable read/search access for explicit workspace roots, then opt into write and move operations only when you want them.
Integrate with chat and webhook channels while keeping one controlled assistant runtime.
Clear CLI workflows, status surfaces, and logs for practical debugging and day-to-day operations.