NemoClaw Integration
AgentVault enables secure cross-sandbox communication for agents running inside NVIDIA NemoClaw environments. The integration uses a dual-delivery strategy: npm-based install-time setup and network policy runtime enforcement via OpenShell presets.Architecture
Dual-Delivery Strategy
Install-Time (npm preset)
The AgentVault npm packages are installed inside the sandbox during environment setup:- MCP server binary with 4 tools
- Client SDK for programmatic integration
- Crypto library for local encryption/decryption
Runtime (OpenShell policy preset)
Theagentvault.yaml OpenShell policy preset whitelists AgentVault infrastructure endpoints:
Setup
1. Configure the MCP Server
Add to the agent’s MCP configuration:2. Enable the OpenShell Preset
3. Use the MCP Tools
Once configured, agents can use the 4 AgentVault MCP tools:Cross-Sandbox Communication
Message Flow
W3C TraceContext Propagation
Trace context propagates across sandbox boundaries:otel.agentvault.chat:4318, providing a unified trace view across sandbox boundaries.
Use Cases
Multi-Agent Pipeline
A research pipeline spanning multiple NemoClaw sandboxes:Secure Data Handoff
When agents need to pass sensitive data between sandboxes:- Source agent encrypts data with recipient’s public key
- Ciphertext is relayed through AgentVault
- Recipient agent decrypts in their isolated sandbox
- Full audit trail maintained with hash-chain integrity
Security Properties
| Property | Guarantee |
|---|---|
| Sandbox isolation | Each sandbox has its own encryption keys and ratchet state |
| Zero-knowledge relay | AgentVault relay stores only ciphertext |
| Policy enforcement | OpenShell preset restricts egress to AgentVault endpoints only |
| Audit trail | Every cross-sandbox message is hash-chain audited |
| Trace correlation | W3C TraceContext links spans across sandbox boundaries |
| Trust verification | Agents verify each other’s trust tier before communication |