VulpineOS
Docs
Runtime
Runtime overview
Hardened browser, orchestrator, MCP
Injection filter
Strip invisible DOM before the agent
Action lock
Freeze JS, timers, reflows mid-think
Optimised DOM
93.1% measured token reduction
Operator surfaces
Web panel
Embedded operator console
TUI workbench
SSH-friendly terminal UI
MCP toolbelt
36 typed browser tools
Vulpine-Box
One-container self-host
Ecosystem
Foxbridge
CDP ↔ Juggler / WebDriver BiDi
vulpine-mark
Set-of-Mark visual labelling
mobilebridge
Android device sessions
OpenClaw
Pre-configured agent loop
Documentation
Quickstart
First agent in 30 seconds
Architecture
Four-phase security model
MCP Reference
All 36 browser tools
Agent Scripting DSL
Declarative agent definitions
Open source
VulpineOS Runtime
GitHub, MPL 2.0
Foxbridge
CDP ↔ Juggler / WebDriver BiDi
vulpine-mark
Set-of-Mark visual labelling
mobilebridge
Android device discovery + sessions
Integrations
OpenClaw
Pre-configured agent loop
Camoufox
Anti-detect browser core
LLM providers
30+ models, one toolbelt
Docker (Vulpine-Box)
One-click self-host
Guides
AI Agent Security
Threat model, mitigations
Prevent Prompt Injection
Hidden DOM, ARIA tricks
OpenClaw + Camoufox
End-to-end setup
Camoufox vs Chrome
Why Firefox, why patches
Engineering
Changelog
Release notes as work lands
Roadmap
Now, next, later, research
Blog
Long-form posts on the runtime
RenderLab
Optional render-diagnostics study
Community
Support
How to get help, fast
GitHub Discussions
Ideas, RFCs, support
Contributing
How to help
Security
Responsible disclosure
Star on GitHub →
Integration · OpenClaw

OpenClaw, on a hardened browser.

VulpineOS turns OpenClaw from a CLI agent loop into a managed operator runtime. Pre-configured workspace, identity vault, multi-agent orchestrator, 36-tool MCP toolbelt, and a hardened Camoufox browser — all wired in by default.

Open source · MPL 2.0Self-hostedBring your own keys
01

What OpenClaw is

OpenClaw is an open-source agentic CLI. It runs an autonomous agent loop with file editing, shell execution, and tool calls — designed for engineering tasks but flexible enough for browser automation when given the right tools.

VulpineOS uses OpenClaw as its agent execution layer. We don't replace it; we bolt on the things you need to operate hundreds of OpenClaw agents in parallel against real, adversarial websites.

02

What VulpineOS adds

OpenClaw on its own assumes a vanilla browser and a single-process workflow. VulpineOS lifts it into an operator-grade runtime.

01

Pre-configured workspace

A drop-in OpenClaw config with the vulpine-browser skill, browser-tool primitives, and identity-aware session prompts. No manual wiring per agent.

02

Hardened browser routing

OpenClaw drives Camoufox through Foxbridge — the same Chrome DevTools Protocol surface, but on top of a fingerprint-coherent Firefox core instead of vanilla Chrome.

03

Multi-agent orchestrator

Spawn, pause, resume, and kill hundreds of OpenClaw agents from one panel or TUI. Sessions persist across restarts. Per-agent budgets and approval gates included.

04

Identity-aware spawning

Each agent receives a fingerprinted browser context from the vault. Cookies, fingerprints, proxies, and trust state move with the session — not with the agent process.

03

How they fit together

OpenClaw runs as a subprocess inside the VulpineOS orchestrator. We pass it a per-agent workspace config that injects the vulpine-browserskill — that skill exposes our 36-tool MCP toolbelt to OpenClaw. When OpenClaw decides to click or navigate, it goes through VulpineOS's MCP server, through the Juggler protocol, into a Camoufox session managed by the orchestrator.

Browser routing is auto-detected. With the bundled Foxbridge daemon running, OpenClaw connects via CDP to your shared Camoufox instance. If Foxbridge isn't available, OpenClaw falls back to its built-in Chrome — but you lose the stealth and execution primitives that make VulpineOS worth running.

04

Quick start

  1. 01Clone the runtime — git clone https://github.com/VulpineOS/VulpineOS && cd VulpineOS && make build.
  2. 02Run vulpineos. The first-launch wizard handles provider keys and OpenClaw discovery for you.
  3. 03Spawn an agent from the TUI with n, or open the panel with vulpineos panel. Each new agent runs OpenClaw on top of a managed Camoufox session.
  4. 04Inspect runs in real time — conversation, action trace, raw session log, and recording all surface in the panel without exposing hidden reasoning.
05

Resources

  • Architecture

    docs.vulpineos.com/architecture — full breakdown of the OpenClaw / Camoufox / orchestrator path.

  • OpenClaw setup

    docs.vulpineos.com/openclaw-camoufox-setup — end-to-end install plus troubleshooting.

  • VulpineOS runtime

    github.com/VulpineOS/VulpineOS — source, issues, and discussions.

Run your first OpenClaw agent on Camoufox.

Self-host the runtime today, or join the private waitlist for the managed operator layer when it opens.

Read the docs →Join the waitlist
VulpineOS

The browser built for AI agents.
Open-source runtime, end to end.

Camoufox 146.0.1
Product
RuntimeAction lockOptimised DOMMCP toolbeltVulpine-Box
Ecosystem
Foxbridgevulpine-markmobilebridgeOpenClawCamoufox
Resources
Resources hubRoadmapChangelogBlogDocs
Community
SupportDiscussionsContributingIssuesSecurity
© 2026 VulpineOSBuilt on Camoufox · Firefox 146.0.1TermsPrivacyCookiesAcceptable useSecurity