Hardened by design
Secure defaults, credential handling, and policy boundaries are treated as first-class concerns.
Stable release
Carapace runs local-first, keeps security controls explicit, and gives you auditable behavior across chat channels and tooling integrations. Works through Signal, Telegram, Discord, Slack, webhooks, and console.
Run setup, choose your first outcome, then start Carapace:
cara setup
cara
Want a quick security comparison? Carapace vs OpenClaw threat-by-threat table .
New here? Follow the full path: Install -> First Run -> Security -> Ops -> Cookbook.
Carapace ships a stable release line for its verified paths. Partial and in-progress areas are called out explicitly in the docs and feature status.
If you are unsure which first path to choose, start with one provider and
local-chat, then add channels after
cara verify --outcome auto passes.
Use the public help paths for setup blockers, cookbook gaps, or a small-team evaluation. Keep secrets and sensitive details out of public issues.
Use task-focused recipes instead of piecing setup together manually.
Want a missing recipe? Request one here .
Secure defaults, credential handling, and policy boundaries are treated as first-class concerns.
Integrate with chat and webhook channels while keeping one controlled assistant runtime.
Clear CLI workflows, status surfaces, and logs for practical debugging and day-to-day operations.