Connect your local Moltbot gateway to AgentWatch cloud
Project description
agentwatch-cli
Connect your local Moltbot (OpenClaw) gateway to AgentWatch cloud without exposing your local network.
Overview
agentwatch-cli is a secure bridge that allows AgentWatch to communicate with your locally-running Moltbot gateway. Instead of exposing your local network, the connector establishes an outbound Socket.IO connection to AgentWatch cloud and relays messages to your gateway via the OpenClaw WebSocket RPC protocol (chat.send).
Architecture:
AgentWatch Cloud <--Socket.IO--> agentwatch-cli <--WebSocket RPC--> Local Moltbot Gateway
(cloud) (your machine) (your machine)
Key Benefits:
- No port forwarding required - All connections are outbound
- Secure - TLS encryption, HMAC challenge-response authentication, credentials never stored in plain text
- Isolated sessions - Creates a dedicated connector session separate from the user's active session
- Stateless measurement - Session history is cleared after each request to ensure fresh, unbiased context for every question
- Automatic reconnection - Handles network interruptions and stale WebSocket connections gracefully
- Service mode - Runs in background, starts on boot
Requirements
- Python 3.9 or higher
- A running Moltbot (OpenClaw) gateway on your local machine
- An AgentWatch account with a custom agent configured
Installation
macOS
Option 1: Using pipx (Recommended)
# Install pipx if you don't have it
brew install pipx
pipx ensurepath
# Install agentwatch-cli
pipx install agentwatch-cli
Option 2: Using pip
pip install --user agentwatch-cli
# Add to PATH (add this line to ~/.zshrc for persistence)
export PATH="$HOME/Library/Python/3.11/bin:$PATH"
Note: Replace 3.11 with your Python version (check with python3 --version).
Linux (Ubuntu/Debian)
Option 1: Using pipx (Recommended)
# Install pipx if you don't have it
sudo apt install pipx
pipx ensurepath
# Install agentwatch-cli
pipx install agentwatch-cli
Option 2: Using pip
pip install --user agentwatch-cli
The script is installed to ~/.local/bin/ which should already be in your PATH.
Linux (Fedora/RHEL)
# Install pipx
sudo dnf install pipx
pipx ensurepath
# Install agentwatch-cli
pipx install agentwatch-cli
Verify Installation
agentwatch-cli --version
If you get "command not found", ensure your PATH includes the installation directory:
# For pip --user installs:
# macOS: ~/Library/Python/3.X/bin
# Linux: ~/.local/bin
# For pipx installs:
# Usually ~/.local/bin (run `pipx ensurepath` to fix)
Quick Start
1. Create a Custom Agent in AgentWatch
- Go to AgentWatch and navigate to Custom Agents
- Click Add Agent and select Moltbot
- You'll receive an 8-character enrollment code (e.g.,
ABCD-1234)
2. Enroll the Connector
agentwatch-cli enroll --code ABCD-1234
This will:
- Register your connector with AgentWatch
- Auto-discover your gateway token from
~/.openclaw/openclaw.json - Create a dedicated connector session in Moltbot (separate from your interactive sessions)
- Save configuration to
~/.agentwatch-cli/config.json
3. Install as a Service (Recommended)
# Linux (requires sudo)
sudo agentwatch-cli install-service
# macOS (no sudo needed - uses launchd)
agentwatch-cli install-service
That's it! The connector will now:
- Start automatically on boot
- Run in the background
- Reconnect automatically if disconnected
Alternative: Run Manually
agentwatch-cli start
Commands
| Command | Description |
|---|---|
enroll |
Enroll with an enrollment code from AgentWatch |
start |
Start the connector manually |
status |
Check connector status and gateway connectivity |
config |
Update configuration settings |
revoke |
Revoke enrollment and clear credentials |
install-service |
Install as a system service (auto-start) |
uninstall-service |
Remove the system service |
service-status |
Check if the background service is running |
enroll
Enroll the connector with an enrollment code from AgentWatch.
agentwatch-cli enroll --code ABCD-1234
start
Start the connector and begin relaying messages.
agentwatch-cli start
# With custom gateway URL (if not localhost)
agentwatch-cli start --gateway-url http://192.168.1.100:18789
# With explicit gateway token
agentwatch-cli start --gateway-token your-token-here
status
Check the connector status and test gateway connectivity.
agentwatch-cli status
Example output:
AgentWatch CLI Connector Status
========================================
Enrolled: Yes
Agent: My Moltbot
Agent ID: abc123...
Connector ID: def456...
Gateway URL: http://127.0.0.1:18789
AgentWatch URL: wss://agentwatch.helivan.io
Gateway Token: <auto-discovered>
Testing gateway connection...
Gateway Status: ONLINE
config
Configure connector settings.
# Set gateway URL (for remote gateways)
agentwatch-cli config --gateway-url http://192.168.1.100:18789
# Set gateway token explicitly
agentwatch-cli config --gateway-token your-token-here
# Set AgentWatch cloud URL (for self-hosted deployments)
agentwatch-cli config --agentwatch-url wss://your-agentwatch-instance.com
revoke
Revoke enrollment and clear credentials.
agentwatch-cli revoke
# Skip confirmation prompt
agentwatch-cli revoke --force
install-service
Install as a system service for automatic startup.
Linux (systemd):
# Requires sudo
sudo agentwatch-cli install-service
# Specify user (default: current user)
sudo agentwatch-cli install-service --user myuser
macOS (launchd):
# No sudo needed - installs to ~/Library/LaunchAgents
agentwatch-cli install-service
uninstall-service
Remove the system service.
# Linux
sudo agentwatch-cli uninstall-service
# macOS
agentwatch-cli uninstall-service
service-status
Check if the service is running.
agentwatch-cli service-status
Configuration
Configuration is stored in ~/.agentwatch-cli/config.json:
{
"connector_id": "uuid",
"secret": "encrypted-secret",
"agent_id": "uuid",
"agent_name": "My Moltbot",
"gateway_url": "http://127.0.0.1:18789",
"gateway_token": null,
"agentwatch_url": "wss://agentwatch.helivan.io"
}
Gateway Token Auto-Discovery
If gateway_token is null, the connector automatically discovers the token from ~/.openclaw/openclaw.json:
{
"gateway": {
"auth": {
"token": "your-gateway-token"
}
}
}
This is the recommended approach - the token is read fresh each time, so if OpenClaw rotates it, the connector automatically uses the new one.
How It Works
-
Enrollment: When you run
enroll, the CLI exchanges the one-time enrollment code for permanent credentials (connector_id + secret). The gateway token is encrypted (AES-256-GCM) before being stored on the cloud side. -
Connection: On
start, the connector establishes a Socket.IO connection to AgentWatch cloud and authenticates via HMAC challenge-response (the secret is never sent over the wire). It also connects to your local Moltbot gateway over WebSocket and completes the OpenClaw handshake withoperator.adminscope. -
Session Isolation: The connector creates a dedicated session (
agent:main:agentwatch-connector) in your Moltbot's~/.openclaw/agents/main/sessions/sessions.json. This session is separate from your normal interactive sessions, so connector activity never interferes with your own conversations. -
Message Relay: When AgentWatch needs to measure your agent's behavior:
- AgentWatch sends a job request through Socket.IO to your connector
- The connector forwards the question to your local Moltbot gateway using the
chat.sendWebSocket RPC method - The connector waits for the
chatevent withstate: "final"and extracts the response text - The response flows back to AgentWatch through the same Socket.IO channel
-
History Clearing: After each request completes, the connector deletes the session's
.jsonlhistory file. This ensures every question is answered with a clean, empty context — no prior conversation history can influence the response. This is critical for accurate behavior measurement, as each question must be evaluated independently.
Environment Variables
| Variable | Description |
|---|---|
AGENTWATCH_ENROLLMENT_URL |
Override the enrollment API URL (for testing/self-hosted) |
Security
- Credentials protected: Config file has restricted permissions (0600)
- HMAC authentication: The connector authenticates using HMAC-SHA256 challenge-response — the secret is never transmitted over the wire
- Encrypted gateway token: Your Moltbot gateway token is encrypted with AES-256-GCM before being stored on the cloud
- TLS encryption: All Socket.IO and WebSocket communication uses TLS
- Outbound only: No inbound ports required — the connector initiates all connections
Troubleshooting
"Cannot connect to local gateway"
Ensure your Moltbot gateway is running and accepting WebSocket connections on port 18789:
# Check if gateway is listening
agentwatch-cli status
If the gateway shows as offline, start your Moltbot/OpenClaw gateway.
"missing scope: operator.admin"
The connector requires operator.admin scope to use the chat.send method. Ensure your gateway token has sufficient permissions. The token auto-discovered from ~/.openclaw/openclaw.json should have this scope by default.
"Invalid enrollment code"
- Enrollment codes expire after 24 hours
- Each code can only be used once
- Generate a new code in AgentWatch if yours has expired
"Authentication failed"
Your connector credentials may have been revoked. Re-enroll:
agentwatch-cli revoke --force
agentwatch-cli enroll --code NEW_CODE
"command not found: agentwatch-cli"
The CLI isn't in your PATH. Add the installation directory:
macOS (pip --user):
echo 'export PATH="$HOME/Library/Python/3.11/bin:$PATH"' >> ~/.zshrc
source ~/.zshrc
Linux (pip --user):
echo 'export PATH="$HOME/.local/bin:$PATH"' >> ~/.bashrc
source ~/.bashrc
pipx:
pipx ensurepath
# Then restart your terminal
Service won't start
Check the service logs:
Linux:
sudo journalctl -u agentwatch-cli -f
macOS:
cat ~/Library/Logs/agentwatch-cli.log
Upgrading
pipx:
pipx upgrade agentwatch-cli
pip:
pip install --user --upgrade agentwatch-cli
After upgrading, restart the service if installed:
# Linux
sudo systemctl restart agentwatch-cli
# macOS
launchctl unload ~/Library/LaunchAgents/io.agentwatch.cli.plist
launchctl load ~/Library/LaunchAgents/io.agentwatch.cli.plist
Uninstalling
# Remove service first (if installed)
agentwatch-cli uninstall-service # or with sudo on Linux
# Remove package
pipx uninstall agentwatch-cli
# or
pip uninstall agentwatch-cli
# Optionally remove config
rm -rf ~/.agentwatch-cli
License
MIT License - see LICENSE file for details.
Support
- Issues: GitHub Issues
- Documentation: docs.agentwatch.io
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file agentwatch_cli-0.1.13.tar.gz.
File metadata
- Download URL: agentwatch_cli-0.1.13.tar.gz
- Upload date:
- Size: 28.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.10.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e411f1559755472c58e1508dafd2234ea9c84cac7165962de25cf05ac909c0f6
|
|
| MD5 |
6f2fc726103d321f2bc984a4eb664967
|
|
| BLAKE2b-256 |
f3346640649114bc98667400539d2c6b4f970f25531ca53b093b674698ba0420
|
File details
Details for the file agentwatch_cli-0.1.13-py3-none-any.whl.
File metadata
- Download URL: agentwatch_cli-0.1.13-py3-none-any.whl
- Upload date:
- Size: 26.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.10.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
b52aa0a6ec67429faac295115bc58209eb90e8684cde52116c6d31d7e4ea1f42
|
|
| MD5 |
79b13e688d1e3b1394d868f936862b84
|
|
| BLAKE2b-256 |
625ac41ec3153d372309a6ba9f69e82faee552b8385af7e9016928544d38d92b
|