Docker Inc.

03/13/2026 | Press release | Distributed by Public on 03/13/2026 11:16

NanoClaw Partners with Docker to Help Teams Run AI Agents Safely Everywhere

TEL AVIV/PALO ALTO, CA - March 13, 2026 - NanoCo, creators of NanoClaw, the secure open-source AI agent platform, and Docker, Inc., the platform used by millions of developers to build, ship, and run software, today announced that they are integrating NanoClaw with Docker Sandboxes. The integration marks the first time any claw-based agent platform can be deployed inside Docker's MicroVM-based sandbox infrastructure with a single command. NanoClaw has surpassed 20,000 GitHub stars and 100,000 downloads since launching last month, reflecting growing demand for a production-ready, security-first alternative to OpenClaw.

AI agents don't just answer questions. They connect to live data, run code, and take actions on behalf of the people and teams that deploy them. That shift creates a security problem most organizations have not solved. The core issue is isolation: solutions like OpenClaw run directly on the host machine, without hard boundaries separating agents from each other or from the underlying system. A single compromised agent can access credentials, read session histories, and reach data belonging to entirely separate agents. Application-level permission checks don't offer sufficient protection. What is required is OS-enforced isolation: each agent in its own safe environment, with its own filesystem and session history, invisible to every other agent running alongside it.

NanoClaw is built on top of Claude Code, Anthropic's powerful general-purpose coding agent, which ships with sophisticated context management, memory, and tool-use capabilities already built in. NanoClaw wraps this core engine with an orchestration layer that handles scheduled tasks, persistent memory, channel integrations (WhatsApp, Telegram, Slack, Discord), and routing each message to the correct agent, all inside isolated Docker containers running with Docker Sandboxes. The result is an agent that users can configure, extend, and delegate work to entirely from their phone, without writing custom agent code.

With Docker Sandboxes, agents run in MicroVM-based, disposable isolation zones. If an agent were to attempt a container escape, exploiting a zero-day vulnerability for example, it would still be contained. Combined with NanoClaw's minimal attack surface and auditable codebase, the integrated stack is designed to meet the scrutiny of enterprise security teams.

"Every organization wants to put AI agents to work, but the barrier is control: what those agents can access, where they can connect, and what they can change," said Mark Cavage, President and Chief Operating Officer at Docker, Inc. "Docker Sandboxes provide the secure execution layer for running agents safely, and NanoClaw shows what's possible when that foundation is in place."

"We are at the beginning of a shift where every team, in every organization, will have their own team of AI agents doing real work on its behalf," said Gavriel Cohen, creator of NanoClaw. "NanoClaw was built to make that a reality today, and Docker Sandboxes is what makes it a reality that organizations can actually trust. Docker has been ahead of the curve in understanding what agent infrastructure needs to look like at scale, and the combination of NanoClaw's orchestration layer with Docker Sandboxes's isolation and network controls gives every team the foundation to deploy agents in production with confidence."

To get started with NanoClaw in Docker Sandboxes, visit github.com/qwibitai/nanoclaw. More information about Docker Sandboxes is available here.

Resources

Media Contacts

[email protected]@qwibit.ai

Docker Inc. published this content on March 13, 2026, and is solely responsible for the information contained herein. Distributed via Public Technologies (PUBT), unedited and unaltered, on March 13, 2026 at 17:16 UTC. If you believe the information included in the content is inaccurate or outdated and requires editing or removal, please contact us at [email protected]