
Security News
Feross on the 10 Minutes or Less Podcast: Nobody Reads the Code
Socket CEO Feross Aboukhadijeh joins 10 Minutes or Less, a podcast by Ali Rohde, to discuss the recent surge in open source supply chain attacks.
@vercel/vclaw
Advanced tools
Deploy vercel-openclaw from the command line.
vclaw is a workflow wrapper around the installed Vercel CLI. It automates the same high-level setup path as the OpenClaw deploy button:
vercel-labs/vercel-openclawRun without installing:
npx @vercel/vclaw init --scope my-team
Or install globally:
npm i -g @vercel/vclaw
vclaw init --scope my-team
>=20gitnpm i -g vercelvercel login or VERCEL_TOKENYou can check your environment first:
vclaw doctor
Deploy OpenClaw into a Vercel team:
npx @vercel/vclaw init --scope my-team
This will:
vercel-labs/vercel-openclawADMIN_SECRETBasic deploy:
vclaw init --scope my-team
Choose a project name and target directory:
vclaw init --scope my-team --name my-openclaw --dir ~/dev/my-openclaw
Use your own admin secret:
vclaw init --scope my-team --admin-secret "$(openssl rand -hex 32)"
Set a dedicated cron secret:
vclaw init --scope my-team --cron-secret "$(openssl rand -hex 32)"
Enable deployment protection and configure webhook bypass automatically:
vclaw init --scope my-team --deployment-protection sso
Or password protection:
vclaw init --scope my-team --deployment-protection password
Prepare everything but stop before deploy:
vclaw init --scope my-team --skip-deploy
vclaw initFull setup from zero to deployed.
--name <name> Vercel project name (default: openclaw)
--scope <scope> Vercel team scope
--team <slug> Deprecated alias for --scope
--dir <path> Clone destination (default: ./vercel-openclaw)
--admin-secret <hex> Use a specific admin secret
--cron-secret <hex> Optional dedicated cron secret
--deployment-protection <mode> Optional protection mode: none | sso | password
--protection-bypass-secret <s> Optional automation bypass secret
--skip-deploy Stop after provisioning
--yes Skip confirmation prompts where possible
Notes:
--yes does not bypass first-time marketplace terms acceptance if the integration requires a browser step.--deployment-protection also injects VERCEL_AUTOMATION_BYPASS_SECRET so protected incoming webhooks can still reach OpenClaw.--admin-secret, vclaw generates one for you.vclaw verifyRun launch verification against an existing deployment.
--url <url> Deployment URL
--admin-secret <secret> Admin secret for auth
--destructive Run destructive verification phases
--protection-bypass <secret> Deployment protection bypass secret
Example:
vclaw verify \
--url https://my-openclaw.vercel.app \
--admin-secret "$ADMIN_SECRET"
Protected deployment:
vclaw verify \
--url https://my-openclaw.vercel.app \
--admin-secret "$ADMIN_SECRET" \
--protection-bypass "$VERCEL_AUTOMATION_BYPASS_SECRET"
vclaw doctorCheck local prerequisites and current Vercel authentication status.
vclaw manages these variables directly:
ADMIN_SECRETCRON_SECRET when you provide --cron-secretVERCEL_AUTOMATION_BYPASS_SECRET when deployment protection or an explicit bypass secret is configuredIt relies on the Vercel Marketplace integration to supply:
UPSTASH_REDIS_REST_URLUPSTASH_REDIS_REST_TOKENvclaw assumes you already have the Vercel CLI installed.vclaw does not replace vercel; it orchestrates it.x-vercel-protection-bypass header when availableRun tests:
npm test
Preview the npm payload:
npm pack --dry-run
vercel-labs/vclawvercel-labs/vercel-openclawMIT
FAQs
CLI to set up and deploy vercel-openclaw with one command
We found that @vercel/vclaw demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 385 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Socket CEO Feross Aboukhadijeh joins 10 Minutes or Less, a podcast by Ali Rohde, to discuss the recent surge in open source supply chain attacks.

Research
/Security News
Campaign of 108 extensions harvests identities, steals sessions, and adds backdoors to browsers, all tied to the same C2 infrastructure.

Security News
OpenAI rotated macOS signing certificates after a malicious Axios package reached its CI pipeline in a broader software supply chain attack.