Public Beta

MstyClaw OpenClaw-style power, built the Msty way.

Run assigned agents on your full machine or inside Docker for added security boundaries. Keep Msty privacy-first principles, skip telemetry, and choose local or online models based on the task. MstyClaw is currently available for Apple Silicon Macs only.

Runtime Modes

Full Machine Mode

Give MstyClaw access to a specific folder and let it operate with the full power of your machine within that scope.

Docker Isolated Mode

Run the assigned MstyClaw agent in a Docker container for an added security boundary when you want tighter execution isolation, while the app remains outside the container.

Free during beta for personal use.

Why MstyClaw

Powerful automation with control and clarity.

OpenClaw-style capability, Msty polish

If you like the OpenClaw concept, MstyClaw brings that operator workflow into the Msty ecosystem with cleaner UX and practical control.

Privacy-first with zero telemetry

MstyClaw follows the same privacy-first policy as Msty Studio. No hidden telemetry, no usage tracking, and no behavioral analytics.

Big online and local model support

Use large online models when you need reach, or powerful local models when you want tighter control and lower exposure.

Built for real workflows

Point MstyClaw at a folder, keep context where work happens, and let it execute tasks that match your daily operating rhythm.

Integrations

Meet users where they already work.

MstyClaw integrates with Discord, Telegram, and WhatsApp so you can trigger and manage workflows directly in familiar channels.

Discord

Automate team-ready flows where communities and support conversations already happen.

Telegram

Launch fast, command-driven workflows in lean chat environments.

WhatsApp

Connect practical automations to everyday communication channels.

Start Now

Download MstyClaw Beta for free

MstyClaw is currently free in beta for personal use. The current installer is for Apple Silicon Macs only. Use responsibly, review the beta terms, and choose the runtime mode that fits your security needs.