VulpineOS
Docs
Runtime
Hardened Browser
Native Firefox patches, C++ injection filter
Action Lock
Freeze JS, timers, reflows mid-think
Optimized DOM
93.1% measured compression
Trust Warming
Long-lived browser identities
Operator surfaces
Web Panel
Fleet view, sessions, approvals
TUI Workbench
SSH-friendly operator terminal
Remote Access
Control plane over the runtime
MCP Toolbelt
36 tools across navigation, audio, mobile
Ecosystem
Foxbridge
CDP to Juggler / WebDriver BiDi
Vulpine Mark
Set-of-mark visual labeling
MobileBridge
iOS & Android device sessions
Vulpine-Box
One-click Docker self-host
Documentation
Quickstart
First agent in 30 seconds
Architecture
Four-phase security model
MCP Reference
All 36 browser tools
Agent Scripting DSL
Declarative agent definitions
Open source
VulpineOS Runtime
GitHub, MPL 2.0
Foxbridge
CDP to Juggler / WebDriver BiDi
Vulpine Mark
Set-of-mark visual labeling
Android MobileBridge
Device discovery & sessions
Integrations
OpenClaw
Pre-configured agent loop
Camoufox
Anti-detect browser core
LLM providers
30+ models, one toolbelt
Docker (Vulpine-Box)
One-click self-host
Guides
AI Agent Security
Threat model, mitigations
Prevent Prompt Injection
Hidden DOM, ARIA tricks
OpenClaw + Camoufox
End-to-end setup
Camoufox vs Chrome
Why Firefox, why patches
Engineering
Changelog
Release notes as work lands
Roadmap
Now, next, later, research
GitHub Releases
Tagged builds and diffs
RenderLab
Optional render diagnostics study
Community
GitHub Discussions
Ideas, RFCs, support
Contributing
How to help
Issues
Bug reports, feature requests
Contact
support@vulpineos.com
Star on GitHub →
Integration · OpenClaw

OpenClaw, on a hardened browser.

VulpineOS turns OpenClaw from a CLI agent loop into a managed operator runtime. Pre-configured workspace, identity vault, multi-agent orchestrator, 36-tool MCP toolbelt, and a hardened Camoufox browser — all wired in by default.

Open source · MPL 2.0Self-hostedBring your own keys
01

What OpenClaw is

OpenClaw is an open-source agentic CLI. It runs an autonomous agent loop with file editing, shell execution, and tool calls — designed for engineering tasks but flexible enough for browser automation when given the right tools.

VulpineOS uses OpenClaw as its agent execution layer. We don't replace it; we bolt on the things you need to operate hundreds of OpenClaw agents in parallel against real, adversarial websites.

02

What VulpineOS adds

OpenClaw on its own assumes a vanilla browser and a single-process workflow. VulpineOS lifts it into an operator-grade runtime.

01

Pre-configured workspace

A drop-in OpenClaw config with the vulpine-browser skill, browser-tool primitives, and identity-aware session prompts. No manual wiring per agent.

02

Hardened browser routing

OpenClaw drives Camoufox through Foxbridge — the same Chrome DevTools Protocol surface, but on top of a fingerprint-coherent Firefox core instead of vanilla Chrome.

03

Multi-agent orchestrator

Spawn, pause, resume, and kill hundreds of OpenClaw agents from one panel or TUI. Sessions persist across restarts. Per-agent budgets and approval gates included.

04

Identity-aware spawning

Each agent receives a fingerprinted browser context from the vault. Cookies, fingerprints, proxies, and trust state move with the session — not with the agent process.

03

How they fit together

OpenClaw runs as a subprocess inside the VulpineOS orchestrator. We pass it a per-agent workspace config that injects the vulpine-browserskill — that skill exposes our 36-tool MCP toolbelt to OpenClaw. When OpenClaw decides to click or navigate, it goes through VulpineOS's MCP server, through the Juggler protocol, into a Camoufox session managed by the orchestrator.

Browser routing is auto-detected. With the bundled Foxbridge daemon running, OpenClaw connects via CDP to your shared Camoufox instance. If Foxbridge isn't available, OpenClaw falls back to its built-in Chrome — but you lose the stealth and execution primitives that make VulpineOS worth running.

04

Quick start

  1. 01Clone the runtime — git clone https://github.com/VulpineOS/VulpineOS && cd VulpineOS && make build.
  2. 02Run vulpineos. The first-launch wizard handles provider keys and OpenClaw discovery for you.
  3. 03Spawn an agent from the TUI with n, or open the panel with vulpineos panel. Each new agent runs OpenClaw on top of a managed Camoufox session.
  4. 04Inspect runs in real time — conversation, action trace, raw session log, and recording all surface in the panel without exposing hidden reasoning.
05

Resources

  • Architecture

    docs.vulpineos.com/architecture — full breakdown of the OpenClaw / Camoufox / orchestrator path.

  • OpenClaw setup

    docs.vulpineos.com/openclaw-camoufox-setup — end-to-end install plus troubleshooting.

  • VulpineOS runtime

    github.com/VulpineOS/VulpineOS — source, issues, and discussions.

Run your first OpenClaw agent on Camoufox.

Self-host the runtime today, or join the private waitlist for the managed operator layer when it opens.

Read the docs →Join the waitlist
VulpineOS

The browser built for AI agents.
Open-source runtime, end to end.

Camoufox 146.0.1
Product
DocsArchitectureMCP ToolbeltChangelog
Open source
GitHubFoxbridgeVulpine MarkMobileBridge
Resources
RoadmapAI Agent SecurityPrompt InjectionCamoufox vs Chrome
Community
DiscussionsContributingIssuesContact
© 2026 VulpineOSBuilt on Camoufox · Firefox 146.0.1Privacy & Terms