The Next ChatGPT? Testing NVIDIA’s Bold New AI Stack (NemoClaw)

BBetter Stack
컴퓨터/소프트웨어경제 뉴스AI/미래기술

Transcript

00:00:00- Nvidia just came out with a very bold statement.
00:00:03In a recent interview following the Nvidia GTC conference,
00:00:07Jensen Huang declared that OpenClaw-
00:00:09- This is definitely the next chat should be tea.
00:00:11- And with that statement,
00:00:12Nvidia just released their updated stack of OpenClaw
00:00:15that they are calling Nemo Claw.
00:00:17And in the past few days,
00:00:18we've seen a really high uptick of OpenClaw usage
00:00:22following this announcement.
00:00:23So what is the big deal with Nemo Claw?
00:00:25Is it really as revolutionary as Nvidia advertises?
00:00:29Well, that's what we're gonna find out.
00:00:31In today's video, we'll take a look at Nemo Claw,
00:00:34see how it works, and we'll try it out for ourselves.
00:00:37It's gonna be a lot of fun, so let's dive into it.
00:00:40So what exactly is Nemo Claw?
00:00:46Well, at its core,
00:00:47it promises a secure enterprise-grade environment
00:00:50for autonomous AI agents.
00:00:52While the base OpenClaw platform is powerful for automation,
00:00:56it seriously lacks the security oversight
00:00:59needed for professional or sensitive workflows.
00:01:02Nvidia designed Nemo Claw to bridge this gap
00:01:04by wrapping the agent in kind of a safety sandbox
00:01:07that monitors every action the AI takes in real time.
00:01:11And honestly, they might have overdone themselves,
00:01:14but we'll discuss that later in this video.
00:01:16So Nemo Claw is essentially an open-source stack
00:01:19that moves the OpenClaw agent into a secure environment
00:01:22called Nvidia OpenShell.
00:01:24And it works by using what Nvidia calls a blueprint.
00:01:28You can think of it as a master Python script
00:01:30that orchestrates the entire lifecycle of the agent,
00:01:34from creating the sandbox
00:01:35to overseeing the security guardrails.
00:01:38And once it's running, every file access, network request,
00:01:42and inference call is governed by a declarative policy.
00:01:46If the agent tries to reach an unauthorized website
00:01:49or access a restricted part of the file system,
00:01:53OpenShell blocks that action and flags it
00:01:55for manual approval in the terminal.
00:01:58This effectively adds a managed infrastructure layer
00:02:01beneath the agent, allowing it to be productive
00:02:04while remaining inside strict security guardrails.
00:02:07Now that might sound great in theory,
00:02:09but how does it work in practice?
00:02:11Well, let's try to set up our own Nemo Claw
00:02:14and see how it works.
00:02:15So the easiest way to get started
00:02:17is by going to Nvidia's Nemo Claw page
00:02:20and click on the Try Now button.
00:02:22And this will take you to Nvidia's Brev service page,
00:02:25which is essentially their preferred cloud GPU platform.
00:02:29Brev provides pre-configured environments
00:02:31that already have the Nvidia drivers,
00:02:34CUDA and Docker installed,
00:02:36so you can get up and running
00:02:38with a ready-to-use deployment for your Nemo Claw agent.
00:02:41And if you set up a new account,
00:02:42Nvidia does provide $2 of free credits,
00:02:46so you can basically test out your first deployment for free.
00:02:49And once we spin it up,
00:02:50we can use the Brev shell command
00:02:52to connect to our deployment.
00:02:53And from here, we can run the Nemo Claw installation script.
00:02:57And right off the bat,
00:02:58we can see that the default script provided here by Nvidia
00:03:02fails to install Open Shell, so that's a bit annoying.
00:03:05But if this fails for you,
00:03:07you can just manually download it
00:03:08from the Nvidia's GitHub repository.
00:03:10And first, it will ask you to provide the name
00:03:12for your Nemo Claw agent.
00:03:14You can just leave it as the default My Assistant here,
00:03:17or name it whatever you'd like.
00:03:19Next, it will ask you to provide your Nvidia API key,
00:03:22so make sure you have one set up for this purpose,
00:03:25otherwise Nemo Claw might not work properly.
00:03:28And then it will also ask you to choose your inference model.
00:03:31And here, Nvidia is advertising Nemotron
00:03:34as their go-to choice for running Nemo Claw,
00:03:36so I'll choose that and see how well it performs.
00:03:39The installation takes about few minutes to finish,
00:03:42but once that is done, I would advertise as the next step
00:03:45to provide your Telegram bot token,
00:03:47so we can connect our Nemo Claw agent to our Telegram app.
00:03:51Next, we can run Nemo Claw Start.
00:03:53And if you see all green check marks,
00:03:55that means we have successfully kick-started our agent.
00:03:58And from here, the script advises us
00:04:00to open the Open Shell Manager,
00:04:02which is basically Nvidia's TUI blueprint interface,
00:04:06which lets you oversee the whole system
00:04:08and manually approve or deny any incoming network requests.
00:04:12And as soon as we launch it,
00:04:13we can see here that there's already a pending request
00:04:17that we need to approve for Nemo Claw
00:04:18to continue to function without disturbance.
00:04:21We can just click A here to approve
00:04:23and then go back to the overview.
00:04:25Next, we need to connect to our Nemo Claw agent
00:04:27and then launch a gateway
00:04:29to make sure we can chat with it through Telegram.
00:04:32And this is where Nemo Claw starts to get finicky
00:04:34because launching the gateway can sometimes get tricky
00:04:37because sometimes you need to manually kill
00:04:39the previous gateway to start a new one.
00:04:41So at this stage, it's still very buggy.
00:04:44And the Telegram bridge seems to be unstable as well.
00:04:47But most importantly, I found that the inference speed
00:04:50of Nemo Claw is super slow.
00:04:52I don't know if that's just
00:04:53because I'm using Nvidia's Nemotron model,
00:04:56but sometimes it takes Nemo Claw up to two minutes
00:04:59to reply to me on Telegram.
00:05:01And you might also get an issue
00:05:02where the Telegram bot returns a 255 error code.
00:05:06And if this is the case, you should exit the Open Claw shell
00:05:10and in your deployment container,
00:05:11kill any outstanding Telegram bridge processes.
00:05:15And if that doesn't do the trick,
00:05:17you should also go through
00:05:18the Open Claw configure command wizard
00:05:20and make sure to add the Telegram bot token there manually.
00:05:24So you can see how much setup I have to do here
00:05:27just to start with the very basics of running it.
00:05:29So with all these little annoyances,
00:05:31I ended up struggling quite a bit
00:05:33to get it to a stable place.
00:05:35But once I finally got it somewhat functional,
00:05:38I decided to try it out by asking Nemo Claw
00:05:40to make me a cron job that sends me the newest
00:05:43Hacker News articles every three minutes.
00:05:45And here's where Nemo Claw becomes really tedious to use.
00:05:48You see, in order for Nemo Claw to successfully execute
00:05:51this type of cron job, it has to go back and forth
00:05:55on Open Shell and manually approve every network request
00:05:59that Nemo Claw tries to make.
00:06:01And you can imagine that
00:06:02for more complicated workflows and tasks,
00:06:04you would need to really babysit Nemo Claw quite a bit
00:06:08to get through all the outbound network requests
00:06:11by manually approving each one of those.
00:06:13And not to mention you need to prompt the agent several times
00:06:17to let it retry the network calls a second time
00:06:20once you approve them on Open Shell.
00:06:22So you have to go back and forth all the time.
00:06:24I think this seriously kneecaps Open Claw's ability
00:06:27to run autonomously because the security layer
00:06:31is just too strict.
00:06:32As for my own test, after several back and forths,
00:06:35I finally managed to task Nemo Claw to send me a fresh batch
00:06:39of Hacker News articles every three minutes,
00:06:41but it took me half an hour to get it to a working state
00:06:44by constantly babysitting it and monitoring Open Claw logs
00:06:48and making sure that everything is running smoothly
00:06:51and making sure that Nemo Claw is able
00:06:53to set up everything correctly on its own.
00:06:56So I think this is the part where the whole idea
00:06:58of Nemo Claw starts to become very, very complex.
00:07:02NVIDIA does provide additional commands
00:07:04to put specific security policies in place,
00:07:07but for now those commands are very limited
00:07:10and they don't provide a sophisticated way
00:07:12to create custom tailored security rules.
00:07:15I understand that this stack is still very new and fresh
00:07:18and hopefully eventually down the line
00:07:21it might actually become stable enough to incorporate it
00:07:24into production environments.
00:07:26But to be honest, for now Nemo Claw feels very, very unstable
00:07:30and very hard to use.
00:07:32But those are just my observations of Nemo Claw.
00:07:35What about you folks?
00:07:36Have you tried it?
00:07:37Do you like it?
00:07:38Do you struggle with it?
00:07:39I'd like to know your thoughts,
00:07:40so let me know in the comments down below.
00:07:42And folks, if you like these types of technical breakdowns,
00:07:44please let me know by smashing
00:07:46that like button underneath the video.
00:07:48And also don't forget to subscribe to our channel.
00:07:50This has been Andris from Better Stack
00:07:52and I will see you in the next videos.
00:07:55(upbeat music)

Key Takeaway

While Nemo Claw offers a promising security-first architecture for autonomous AI agents, its current iteration is hampered by significant installation bugs, slow inference speeds, and a management overhead that prevents true autonomy.

Highlights

NVIDIA introduced Nemo Claw as a secure, enterprise-grade stack designed to transform OpenClaw into the next ChatGPT-level tool.

The system utilizes Nvidia OpenShell to create a safety sandbox that monitors AI agent actions and file access in real time.

Deployment is facilitated through NVIDIA's Brev service, providing pre-configured cloud GPU environments with $2 in free credits.

A significant feature is the declarative policy system where users must manually approve or deny network requests via a Terminal User Interface (TUI).

Testing revealed substantial stability issues, including installation script failures and buggy Telegram bridge connections.

Inference performance was notably slow, with the Nemotron model taking up to two minutes to respond to simple prompts.

The extreme security guardrails currently hinder autonomy, requiring constant human 'babysitting' for even basic automated tasks.

Timeline

Introduction to Nemo Claw and NVIDIA's Vision

The video begins with Jensen Huang's bold declaration at the NVIDIA GTC conference that Nemo Claw is the next major evolution in AI. This new stack is an update to the OpenClaw platform, aiming to capitalize on the massive uptick in autonomous agent usage. NVIDIA positions this technology as a direct competitor to the ubiquity of ChatGPT but with a focus on specialized stacks. The speaker introduces the goal of the video, which is to verify if Nemo Claw is as revolutionary as advertised. This section sets the stage by highlighting the high expectations surrounding NVIDIA's latest software release.

The Architecture of Security: OpenShell and Blueprints

Nemo Claw is described as a secure environment designed to bridge the gap between powerful automation and the lack of oversight in standard AI agents. It functions by wrapping the agent in a 'safety sandbox' called Nvidia OpenShell, which acts as a managed infrastructure layer. The core of this system is a 'blueprint,' essentially a master Python script that governs the entire lifecycle and security guardrails of the AI. Every action, including file access and network requests, is subject to a declarative policy that triggers manual approval if a violation is detected. This design ensures that sensitive workflows remain protected while the agent performs its tasks.

Setting Up the Environment on NVIDIA Brev

The speaker demonstrates the practical setup process, starting with NVIDIA's dedicated Nemo Claw page and the 'Try Now' button. This leads to Brev, NVIDIA's preferred cloud GPU platform, which offers environments pre-installed with CUDA, Docker, and necessary drivers. To incentivize testing, NVIDIA provides $2 in free credits for new accounts, which is sufficient for a basic initial deployment. The user connects to the remote instance using the 'brev shell' command to begin the actual software installation. This part of the video emphasizes the accessibility of the hardware side of the stack.

Installation Struggles and Configuration Hurdles

The installation phase immediately reveals technical friction, as the default script fails to install Open Shell, requiring a manual download from GitHub. The user must provide a name for the agent, an NVIDIA API key, and select an inference model, with Nemotron being the recommended choice. Additional steps include configuring a Telegram bot token to facilitate communication between the user and the agent. Once the 'Nemo Claw Start' command is executed, a series of green checkmarks indicates that the agent's core processes are running. This section illustrates that despite the 'enterprise' branding, the current setup remains quite technical and prone to errors.

Testing the Interface and Manual Approvals

The speaker explores the Open Shell Manager, a TUI-based blueprint interface that allows users to oversee the system in real time. Almost immediately, a pending network request appears that must be manually approved for the agent to function. The workflow moves to launching a gateway to connect the agent to Telegram, but this proves to be a buggy and finicky process. Often, the user must manually kill previous gateway processes to get a new one to successfully start. This highlights a major bottleneck where the security layer interferes with the user experience and system stability.

Performance Issues and Error Handling

A critical drawback discovered during testing is the extremely slow inference speed, with responses taking up to two minutes on Telegram. The speaker also encounters a '255 error code,' which requires exiting the shell and killing outstanding processes within the deployment container. To fix persistent connection issues, the user had to manually enter the Telegram token into the Open Claw configuration wizard. These 'little annoyances' added up to a significant struggle just to reach a baseline of functional stability. The segment serves as a warning about the current unrefined state of the software's performance.

The 'Babysitting' Problem and Final Verdict

In a final test, the speaker attempts to have Nemo Claw create a cron job for Hacker News articles, which reveals the 'tedious' nature of the tool. The agent's autonomy is 'kneecapped' because every individual outbound network call requires the user to switch windows and manually click 'approve'. It took thirty minutes of constant monitoring and 'babysitting' to get a simple three-minute task working correctly. While NVIDIA provides security policy commands, they are currently too limited to create sophisticated, automated rules for production environments. The video concludes that while the concept has potential, Nemo Claw is currently too unstable and complex for practical use.

Community Posts

View all posts