Gclaw exposes a dedicated VM where the OpenClaw agent runs. Direct SSH access can be useful for inspecting workspace files, copying data off the VM, or running commands that are easier from a terminal than from the chat interface. Access is granted by asking the Gclaw assistant to add an SSH public key to theDocumentation Index
Fetch the complete documentation index at: https://gcore.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
ubuntu user’s authorized_keys file.
Prerequisites
- A running Gclaw instance reachable through the Gcore Customer Portal or a connected channel (Telegram, Discord, or another configured platform).
- A local machine with
sshandssh-keygenavailable.
Step 1. Generate an SSH key pair
On the local machine, generate a new key pair dedicated to the Gclaw VM. Using a separate key makes it easier to revoke access later without affecting other servers.~/.ssh/gclaw_ed25519— the private key. Keep this file local.~/.ssh/gclaw_ed25519.pub— the public key. Share this with Gclaw in the next step.
ssh-ed25519 and ending with the comment gclaw-vm.
Step 2. Ask Gclaw to authorize the key
Open the Gclaw chat in the Gcore Customer Portal, or use a connected channel such as Telegram or Discord. Send the public key to the assistant with a request to append it to theubuntu user’s authorized_keys file:
“Please add the following SSH public key toThe assistant appends the key to~/.ssh/authorized_keysfor the ubuntu user:ssh-ed25519 AAAA... gclaw-vm”
/home/ubuntu/.ssh/authorized_keys, creating the file with the correct permissions if it does not already exist. Ask the assistant to confirm the contents of the file before continuing.
Step 3. Retrieve the VM IP address
Ask the assistant to print the VM’s IPv4 address:
“Run ip -4 a and show me the output.”
The assistant executes the command and returns the network interface details. Locate the public IPv4 address assigned to the primary interface (typically eth0 or ens3) and copy it for the next step.
Step 4. Connect to the VM
From the local machine, connect as theubuntu user, pointing ssh at the private key created in Step 1. Replace <IP> with the address from the previous step.
ssh prompts to accept the VM’s host key fingerprint. After accepting, a shell session opens on the VM as the ubuntu user.
Revoke SSH access
To remove SSH access, ask the assistant to delete the corresponding line from/home/ubuntu/.ssh/authorized_keys:
“Remove the SSH public key with commentAfter confirming the change, delete the local key pair if it is no longer needed:gclaw-vmfrom~/.ssh/authorized_keys.”
Troubleshooting
- Permission denied (publickey): Verify that the public key in
authorized_keysmatches the local.pubfile exactly and that the private key path passed with-iis correct. Ask the assistant to print the contents of~/.ssh/authorized_keysfor comparison. - Connection timed out: Confirm the IP address with
ip -4 aagain. The VM IP can change after a recreate. - Host key changed warning: If the instance was recreated, the VM host key is regenerated. Remove the stale entry with
ssh-keygen -R <IP>before reconnecting.