OmniClaw

Comparison

Containers vs
microVM isolation.

Containers share a kernel. MicroVMs do not. For AI agents that handle credentials and user data, this difference matters.

What container hosting means.

Container platforms (Docker, Kubernetes, ECS, Cloud Run) run your OpenClaw instance as a process that shares the host operating system kernel with every other container on the machine.

Isolation comes from Linux namespaces and cgroups — the same kernel features that power process separation. This is lightweight and fast, but the security boundary is the kernel itself. A kernel vulnerability in one container can potentially reach all others.

For many workloads, this is fine. For AI agents that store API keys, process user messages, and have internet access, the shared kernel is a meaningful risk.

Security

The isolation gap.

Container escape

A vulnerability in the shared kernel (like CVE-2022-0185 or CVE-2024-1086) can allow one container to access the host and all other containers. These CVEs are discovered regularly.

Shared resources

Containers share CPU, memory, and I/O through cgroups. A noisy neighbor can degrade your agent's performance. Side-channel attacks (Spectre, Meltdown variants) remain a concern on shared hardware.

Secret exposure

Kubernetes secrets are base64-encoded, not encrypted. They persist in etcd and can be read by anyone with cluster access. Environment variables are visible in /proc and often logged.

Feature by feature

The full breakdown.

FeatureContainer hostingOmniClaw
Isolation boundaryProcess-level (shared kernel)Hardware-level (dedicated kernel)
Breakout riskKernel exploit affects all containersRequires hypervisor exploit
Setup time30-60 minutes (Docker + K8s)Under 60 seconds
Monthly cost~$20/mo (managed K8s or PaaS)$0-19/mo
CVE exposureShared kernel CVEs affect all tenantsEach VM has its own kernel — isolated patches
Credential storageK8s secrets or env vars (base64, not encrypted)AES-256 encrypted vault, injected at boot
Network isolationNetwork policies (often misconfigured)Blocked by default, allowlist only
Resource sharingCPU, memory, I/O shared via cgroupsDedicated CPU and memory per VM
Auto-destroyPersistent by default24h TTL, zero leftover state
UpdatesRolling deploys (you manage images)Automatic, zero-downtime
MonitoringPrometheus, Grafana, etc. (you configure)Built-in dashboard
Data residencyDepends on cloud provider and regionEU (Finland + Germany)

Cost

The real cost of containers.

Container hosting looks cheap until you add the infrastructure around it.

ItemContainer hostingOmniClaw
Compute$15-40/mo (managed K8s node)$0 (free tier) or $19/mo (Pro)
Load balancer$10-20/moIncluded
Container registry$0-10/moNot needed
Monitoring stack$0-30/mo (Datadog, Grafana Cloud)Included
SSL certificatesFree (Let's Encrypt) but you manage renewalIncluded
Engineering timeOngoing (Dockerfiles, CI/CD, debugging)Zero

Which approach is right for you?

Container hosting works when...

  • You already have a Kubernetes cluster
  • Shared-kernel isolation is acceptable for your use case
  • Your team has DevOps expertise
  • You need custom networking or service mesh integration
  • You are running many microservices and want OpenClaw alongside them

OmniClaw is better when...

  • Security and isolation are priorities
  • You do not want to manage infrastructure
  • You need to be running in minutes, not hours
  • Your agent handles sensitive credentials or user data
  • You want EU data residency without configuring it

Isolation without Kubernetes.

Every agent gets its own kernel. No Docker, no K8s, no YAML. Just a running OpenClaw instance in 60 seconds.