# Claw Code Usage This guide covers the current Rust workspace under `rust/` and the `claw` CLI binary. If you are brand new, make the doctor health check your first run: start `claw`, then run `/doctor`. > [!TIP] > **Building orchestration code that calls `claw` as a subprocess?** See [`ERROR_HANDLING.md`](./ERROR_HANDLING.md) for the unified error-handling pattern (one handler for all 14 clawable commands, exit codes, JSON envelope contract, and recovery strategies). ## Quick-start health check Run this before prompts, sessions, or automation: ```bash cd rust cargo build --workspace ./target/debug/claw # first command inside the REPL /doctor ``` `/doctor` is the built-in setup and preflight diagnostic. Once you have a saved session, you can rerun it with `./target/debug/claw --resume latest /doctor`. ## Prerequisites - Rust toolchain with `cargo` - One of: - `ANTHROPIC_API_KEY` for direct API access - `ANTHROPIC_AUTH_TOKEN` for bearer-token auth - Optional: `ANTHROPIC_BASE_URL` when targeting a proxy or local service ## Install / build the workspace ```bash cd rust cargo build --workspace ``` The CLI binary is available at `rust/target/debug/claw` after a debug build. Make the doctor check above your first post-build step. ## Quick start ### First-run doctor check ```bash cd rust ./target/debug/claw /doctor ``` Or run doctor directly with JSON output for scripting: ```bash cd rust ./target/debug/claw doctor --output-format json ``` **Note:** Diagnostic verbs (`doctor`, `status`, `sandbox`, `version`) support `--output-format json` for machine-readable output. Invalid suffix arguments (e.g., `--json`) are now rejected at parse time rather than falling through to prompt dispatch. ### Initialize a repository Set up a new repository with `.claw` config, `.claw.json`, `.gitignore` entries, and a `CLAUDE.md` guidance file: ```bash cd /path/to/your/repo ./target/debug/claw init ``` Text mode (human-readable) shows artifact creation summary with project path and next steps. Idempotent — running multiple times in the same repo marks already-created files as "skipped". JSON mode for scripting: ```bash ./target/debug/claw init --output-format json ``` Returns structured output with `project_path`, `created[]`, `updated[]`, `skipped[]` arrays (one per artifact), and `artifacts[]` carrying each file's `name` and machine-stable `status` tag. The legacy `message` field preserves backward compatibility. **Why structured fields matter:** Claws can detect per-artifact state (`created` vs `updated` vs `skipped`) without substring-matching human prose. Use the `created[]`, `updated[]`, and `skipped[]` arrays for conditional follow-up logic (e.g., only commit if files were actually created, not just updated). ### Interactive REPL ```bash cd rust ./target/debug/claw ``` ### One-shot prompt ```bash cd rust ./target/debug/claw prompt "summarize this repository" ``` ### Shorthand prompt mode ```bash cd rust ./target/debug/claw "explain rust/crates/runtime/src/lib.rs" ``` ### JSON output for scripting All clawable commands support `--output-format json` for machine-readable output. **IMPORTANT SCHEMA VERSION NOTICE:** The JSON envelope is currently in **v1.0 (flat shape)** and is scheduled to migrate to **v2.0 (nested schema)** in a future release. See [`FIX_LOCUS_164.md`](./FIX_LOCUS_164.md) for the full migration plan. #### Current (v1.0) envelope shape **Success envelope** — verb-specific fields + `kind: ""`: ```json { "kind": "doctor", "checks": [...], "summary": {...}, "has_failures": false, "report": "...", "message": "..." } ``` **Error envelope** — flat error fields at top level: ```json { "error": "unrecognized argument `foo`", "hint": "Run `claw --help` for usage.", "kind": "cli_parse", "type": "error" } ``` **Known issues with v1.0:** - Missing `exit_code`, `command`, `timestamp`, `output_format`, `schema_version` fields - `error` is a string, not a structured object with operation/target/retryable/message/hint - `kind` field is semantically overloaded (verb identity in success, error classification in error) - See [`SCHEMAS.md`](./SCHEMAS.md) for documented (v2.0 target) schema and [`FIX_LOCUS_164.md`](./FIX_LOCUS_164.md) for migration details #### Using v1.0 envelopes in your code **Success path:** Check for absence of `type: "error"`, then access verb-specific fields: ```bash cd rust ./target/debug/claw doctor --output-format json | jq '.kind, .has_failures' ``` **Error path:** Check for `type == "error"`, then access `error` (string) and `kind` (error classification): ```bash cd rust ./target/debug/claw doctor invalid-arg --output-format json | jq '.error, .kind' ``` **Do NOT rely on `kind` alone for dispatching** — it has different meanings in success vs. error. Always check `type == "error"` first. ```bash cd rust ./target/debug/claw --output-format json prompt "status" ./target/debug/claw --output-format json load-session my-session-id ./target/debug/claw --output-format json turn-loop "analyze logs" --max-turns 1 ``` **Building a dispatcher or orchestration script?** See [`ERROR_HANDLING.md`](./ERROR_HANDLING.md) for the unified error-handling pattern. One code example works for all 14 clawable commands: parse the exit code, classify by `error.kind`, apply recovery strategies (retry, timeout recovery, validation, logging). Use that pattern instead of reimplementing error handling per command. **Migrating to v2.0?** Check back after [`FIX_LOCUS_164`](./FIX_LOCUS_164.md) is implemented. Phase 1 will add a `--envelope-version=2.0` flag for opt-in access to the structured envelope schema. Phase 2 will make v2.0 the default. Phase 3 will deprecate v1.0. ### Inspect worker state The `claw state` command reads `.claw/worker-state.json`, which is written by the interactive REPL or a one-shot prompt when a worker executes a task. This file contains the worker ID, session reference, model, and permission mode. Prerequisite: You must run `claw` (interactive REPL) or `claw prompt ` at least once in the repository to produce the worker state file. ```bash cd rust ./target/debug/claw state ``` JSON mode: ```bash ./target/debug/claw state --output-format json ``` If you run `claw state` before any worker has executed, you will see a helpful error: ``` error: no worker state file found at .claw/worker-state.json Hint: worker state is written by the interactive REPL or a non-interactive prompt. Run: claw # start the REPL (writes state on first turn) Or: claw prompt # run one non-interactive turn Then rerun: claw state [--output-format json] ``` ## Advanced slash commands (Interactive REPL only) These commands are available inside the interactive REPL (`claw` with no args). They extend the assistant with workspace analysis, planning, and navigation features. ### `/ultraplan` — Deep planning with multi-step reasoning **Purpose:** Break down a complex task into steps using extended reasoning. ```bash # Start the REPL claw # Inside the REPL /ultraplan refactor the auth module to use async/await /ultraplan design a caching layer for database queries /ultraplan analyze this module for performance bottlenecks ``` Output: A structured plan with numbered steps, reasoning for each step, and expected outcomes. Use this when you want the assistant to think through a problem in detail before coding. ### `/teleport` — Jump to a file or symbol **Purpose:** Quickly navigate to a file, function, class, or struct by name. ```bash # Jump to a symbol /teleport UserService /teleport authenticate_user /teleport RequestHandler # Jump to a file /teleport src/auth.rs /teleport crates/runtime/lib.rs /teleport ./ARCHITECTURE.md ``` Output: The file content, with the requested symbol highlighted or the file fully loaded. Useful for exploring the codebase without manually navigating directories. If multiple matches exist, the assistant shows the top candidates. ### `/bughunter` — Scan for likely bugs and issues **Purpose:** Analyze code for common pitfalls, anti-patterns, and potential bugs. ```bash # Scan the entire workspace /bughunter # Scan a specific directory or file /bughunter src/handlers /bughunter rust/crates/runtime /bughunter src/auth.rs ``` Output: A list of suspicious patterns with explanations (e.g., "unchecked unwrap()", "potential race condition", "missing error handling"). Each finding includes the file, line number, and suggested fix. Use this as a first pass before a full code review. ## Model and permission controls ```bash cd rust ./target/debug/claw --model sonnet prompt "review this diff" ./target/debug/claw --permission-mode read-only prompt "summarize Cargo.toml" ./target/debug/claw --permission-mode workspace-write prompt "update README.md" ./target/debug/claw --allowedTools read,glob "inspect the runtime crate" ``` Supported permission modes: - `read-only` - `workspace-write` - `danger-full-access` Model aliases currently supported by the CLI: - `opus` → `claude-opus-4-6` - `sonnet` → `claude-sonnet-4-6` - `haiku` → `claude-haiku-4-5-20251213` ## Authentication ### API key ```bash export ANTHROPIC_API_KEY="sk-ant-..." ``` ### OAuth ```bash cd rust export ANTHROPIC_AUTH_TOKEN="anthropic-oauth-or-proxy-bearer-token" ``` ### Which env var goes where `claw` accepts two Anthropic credential env vars and they are **not interchangeable** — the HTTP header Anthropic expects differs per credential shape. Putting the wrong value in the wrong slot is the most common 401 we see. | Credential shape | Env var | HTTP header | Typical source | |---|---|---|---| | `sk-ant-*` API key | `ANTHROPIC_API_KEY` | `x-api-key: sk-ant-...` | [console.anthropic.com](https://console.anthropic.com) | | OAuth access token (opaque) | `ANTHROPIC_AUTH_TOKEN` | `Authorization: Bearer ...` | an Anthropic-compatible proxy or OAuth flow that mints bearer tokens | | OpenRouter key (`sk-or-v1-*`) | `OPENAI_API_KEY` + `OPENAI_BASE_URL=https://openrouter.ai/api/v1` | `Authorization: Bearer ...` | [openrouter.ai/keys](https://openrouter.ai/keys) | **Why this matters:** if you paste an `sk-ant-*` key into `ANTHROPIC_AUTH_TOKEN`, Anthropic's API will return `401 Invalid bearer token` because `sk-ant-*` keys are rejected over the Bearer header. The fix is a one-line env var swap — move the key to `ANTHROPIC_API_KEY`. Recent `claw` builds detect this exact shape (401 + `sk-ant-*` in the Bearer slot) and append a hint to the error message pointing at the fix. **If you meant a different provider:** if `claw` reports missing Anthropic credentials but you already have `OPENAI_API_KEY`, `XAI_API_KEY`, or `DASHSCOPE_API_KEY` exported, you most likely forgot to prefix the model name with the provider's routing prefix. Use `--model openai/gpt-4.1-mini` (OpenAI-compat / OpenRouter / Ollama), `--model grok` (xAI), or `--model qwen-plus` (DashScope) and the prefix router will select the right backend regardless of the ambient credentials. The error message now includes a hint that names the detected env var. ## Local Models `claw` can talk to local servers and provider gateways through either Anthropic-compatible or OpenAI-compatible endpoints. Use `ANTHROPIC_BASE_URL` with `ANTHROPIC_AUTH_TOKEN` for Anthropic-compatible services, or `OPENAI_BASE_URL` with `OPENAI_API_KEY` for OpenAI-compatible services. ### Anthropic-compatible endpoint ```bash export ANTHROPIC_BASE_URL="http://127.0.0.1:8080" export ANTHROPIC_AUTH_TOKEN="local-dev-token" cd rust ./target/debug/claw --model "claude-sonnet-4-6" prompt "reply with the word ready" ``` ### OpenAI-compatible endpoint ```bash export OPENAI_BASE_URL="http://127.0.0.1:8000/v1" export OPENAI_API_KEY="local-dev-token" cd rust ./target/debug/claw --model "qwen2.5-coder" prompt "reply with the word ready" ``` ### Ollama ```bash export OPENAI_BASE_URL="http://127.0.0.1:11434/v1" unset OPENAI_API_KEY cd rust ./target/debug/claw --model "llama3.2" prompt "summarize this repository in one sentence" ``` ### OpenRouter ```bash export OPENAI_BASE_URL="https://openrouter.ai/api/v1" export OPENAI_API_KEY="sk-or-v1-..." cd rust ./target/debug/claw --model "openai/gpt-4.1-mini" prompt "summarize this repository in one sentence" ``` ### Alibaba DashScope (Qwen) For Qwen models via Alibaba's native DashScope API (higher rate limits than OpenRouter): ```bash export DASHSCOPE_API_KEY="sk-..." cd rust ./target/debug/claw --model "qwen/qwen-max" prompt "hello" # or bare: ./target/debug/claw --model "qwen-plus" prompt "hello" ``` Model names starting with `qwen/` or `qwen-` are automatically routed to the DashScope compatible-mode endpoint (`https://dashscope.aliyuncs.com/compatible-mode/v1`). You do **not** need to set `OPENAI_BASE_URL` or unset `ANTHROPIC_API_KEY` — the model prefix wins over the ambient credential sniffer. Reasoning variants (`qwen-qwq-*`, `qwq-*`, `*-thinking`) automatically strip `temperature`/`top_p`/`frequency_penalty`/`presence_penalty` before the request hits the wire (these params are rejected by reasoning models). ## Supported Providers & Models `claw` has three built-in provider backends. The provider is selected automatically based on the model name, falling back to whichever credential is present in the environment. ### Provider matrix | Provider | Protocol | Auth env var(s) | Base URL env var | Default base URL | |---|---|---|---|---| | **Anthropic** (direct) | Anthropic Messages API | `ANTHROPIC_API_KEY` or `ANTHROPIC_AUTH_TOKEN` | `ANTHROPIC_BASE_URL` | `https://api.anthropic.com` | | **xAI** | OpenAI-compatible | `XAI_API_KEY` | `XAI_BASE_URL` | `https://api.x.ai/v1` | | **OpenAI-compatible** | OpenAI Chat Completions | `OPENAI_API_KEY` | `OPENAI_BASE_URL` | `https://api.openai.com/v1` | | **DashScope** (Alibaba) | OpenAI-compatible | `DASHSCOPE_API_KEY` | `DASHSCOPE_BASE_URL` | `https://dashscope.aliyuncs.com/compatible-mode/v1` | The OpenAI-compatible backend also serves as the gateway for **OpenRouter**, **Ollama**, and any other service that speaks the OpenAI `/v1/chat/completions` wire format — just point `OPENAI_BASE_URL` at the service. **Model-name prefix routing:** If a model name starts with `openai/`, `gpt-`, `qwen/`, or `qwen-`, the provider is selected by the prefix regardless of which env vars are set. This prevents accidental misrouting to Anthropic when multiple credentials exist in the environment. ### Tested models and aliases These are the models registered in the built-in alias table with known token limits: | Alias | Resolved model name | Provider | Max output tokens | Context window | |---|---|---|---|---| | `opus` | `claude-opus-4-6` | Anthropic | 32 000 | 200 000 | | `sonnet` | `claude-sonnet-4-6` | Anthropic | 64 000 | 200 000 | | `haiku` | `claude-haiku-4-5-20251213` | Anthropic | 64 000 | 200 000 | | `grok` / `grok-3` | `grok-3` | xAI | 64 000 | 131 072 | | `grok-mini` / `grok-3-mini` | `grok-3-mini` | xAI | 64 000 | 131 072 | | `grok-2` | `grok-2` | xAI | — | — | Any model name that does not match an alias is passed through verbatim. This is how you use OpenRouter model slugs (`openai/gpt-4.1-mini`), Ollama tags (`llama3.2`), or full Anthropic model IDs (`claude-sonnet-4-20250514`). ### User-defined aliases You can add custom aliases in any settings file (`~/.claw/settings.json`, `.claw/settings.json`, or `.claw/settings.local.json`): ```json { "aliases": { "fast": "claude-haiku-4-5-20251213", "smart": "claude-opus-4-6", "cheap": "grok-3-mini" } } ``` Local project settings override user-level settings. Aliases resolve through the built-in table, so `"fast": "haiku"` also works. ### How provider detection works 1. If the resolved model name starts with `claude` → Anthropic. 2. If it starts with `grok` → xAI. 3. Otherwise, `claw` checks which credential is set: `ANTHROPIC_API_KEY`/`ANTHROPIC_AUTH_TOKEN` first, then `OPENAI_API_KEY`, then `XAI_API_KEY`. 4. If nothing matches, it defaults to Anthropic. ## FAQ ### What about Codex? The name "codex" appears in the Claw Code ecosystem but it does **not** refer to OpenAI Codex (the code-generation model). Here is what it means in this project: - **`oh-my-codex` (OmX)** is the workflow and plugin layer that sits on top of `claw`. It provides planning modes, parallel multi-agent execution, notification routing, and other automation features. See [PHILOSOPHY.md](./PHILOSOPHY.md) and the [oh-my-codex repo](https://github.com/Yeachan-Heo/oh-my-codex). - **`.codex/` directories** (e.g. `.codex/skills`, `.codex/agents`, `.codex/commands`) are legacy lookup paths that `claw` still scans alongside the primary `.claw/` directories. - **`CODEX_HOME`** is an optional environment variable that points to a custom root for user-level skill and command lookups. `claw` does **not** support OpenAI Codex sessions, the Codex CLI, or Codex session import/export. If you need to use OpenAI models (like GPT-4.1), configure the OpenAI-compatible provider as shown above in the [OpenAI-compatible endpoint](#openai-compatible-endpoint) and [OpenRouter](#openrouter) sections. ## HTTP proxy support `claw` honours the standard `HTTP_PROXY`, `HTTPS_PROXY`, and `NO_PROXY` environment variables (both upper- and lower-case spellings are accepted) when issuing outbound requests to Anthropic, OpenAI-, and xAI-compatible endpoints. Set them before launching the CLI and the underlying `reqwest` client will be configured automatically. ### Environment variables ```bash export HTTPS_PROXY="http://proxy.corp.example:3128" export HTTP_PROXY="http://proxy.corp.example:3128" export NO_PROXY="localhost,127.0.0.1,.corp.example" cd rust ./target/debug/claw prompt "hello via the corporate proxy" ``` ### Programmatic `proxy_url` config option As an alternative to per-scheme environment variables, the `ProxyConfig` type exposes a `proxy_url` field that acts as a single catch-all proxy for both HTTP and HTTPS traffic. When `proxy_url` is set it takes precedence over the separate `http_proxy` and `https_proxy` fields. ```rust use api::{build_http_client_with, ProxyConfig}; // From a single unified URL (config file, CLI flag, etc.) let config = ProxyConfig::from_proxy_url("http://proxy.corp.example:3128"); let client = build_http_client_with(&config).expect("proxy client"); // Or set the field directly alongside NO_PROXY let config = ProxyConfig { proxy_url: Some("http://proxy.corp.example:3128".to_string()), no_proxy: Some("localhost,127.0.0.1".to_string()), ..ProxyConfig::default() }; let client = build_http_client_with(&config).expect("proxy client"); ``` ### Notes - When both `HTTPS_PROXY` and `HTTP_PROXY` are set, the secure proxy applies to `https://` URLs and the plain proxy applies to `http://` URLs. - `proxy_url` is a unified alternative: when set, it applies to both `http://` and `https://` destinations, overriding the per-scheme fields. - `NO_PROXY` accepts a comma-separated list of host suffixes (for example `.corp.example`) and IP literals. - Empty values are treated as unset, so leaving `HTTPS_PROXY=""` in your shell will not enable a proxy. - If a proxy URL cannot be parsed, `claw` falls back to a direct (no-proxy) client so existing workflows keep working; double-check the URL if you expected the request to be tunnelled. ## Common operational commands ```bash cd rust ./target/debug/claw status ./target/debug/claw sandbox ./target/debug/claw agents ./target/debug/claw mcp ./target/debug/claw skills ./target/debug/claw system-prompt --cwd .. --date 2026-04-04 ``` ### `dump-manifests` — Export upstream plugin/MCP manifests **Purpose:** Dump built-in tool and plugin manifests to stdout as JSON, for parity comparison against the upstream Claude Code TypeScript implementation. **Prerequisite:** This command requires access to upstream source files (`src/commands.ts`, `src/tools.ts`, `src/entrypoints/cli.tsx`). Set `CLAUDE_CODE_UPSTREAM` env var or pass `--manifests-dir`. ```bash # Via env var CLAUDE_CODE_UPSTREAM=/path/to/upstream claw dump-manifests # Via flag claw dump-manifests --manifests-dir /path/to/upstream ``` **When to use:** Parity work (comparing the Rust port's tool/plugin surface against the canonical TypeScript implementation). Not needed for normal operation. **Error mode:** If upstream sources are missing, exits with `error-kind: missing_manifests` and a hint about how to provide them. ### `bootstrap-plan` — Show startup component graph **Purpose:** Print the ordered list of startup components that are initialized when `claw` begins a session. Useful for debugging startup issues or verifying that fast-path optimizations are in place. ```bash claw bootstrap-plan ``` **Sample output:** ``` - CliEntry - FastPathVersion - StartupProfiler - SystemPromptFastPath - ChromeMcpFastPath ``` **When to use:** - Debugging why startup is slow (compare your plan to the expected one) - Verifying that fast-path components are registered - Understanding the load order before customizing hooks or plugins **Related:** See `claw doctor` for health checks against these startup components. ### `acp` — Agent Context Protocol / Zed editor integration status **Purpose:** Report the current state of the ACP (Agent Context Protocol) / Zed editor integration. Currently **discoverability only** — no editor daemon is available yet. ```bash claw acp claw acp serve # same output; `serve` is accepted but not yet launchable claw --acp # alias claw -acp # alias ``` **Sample output:** ``` ACP / Zed Status discoverability only Launch `claw acp serve` / `claw --acp` / `claw -acp` report status only; no editor daemon is available yet Today use `claw prompt`, the REPL, or `claw doctor` for local verification Tracking ROADMAP #76 ``` **When to use:** Check whether ACP/Zed integration is ready in your current build. Plan around its availability (track ROADMAP #76 for status). **Today's alternatives:** Use `claw prompt` for one-shot runs, the interactive REPL for iterative work, or `claw doctor` for local verification. ### `export` — Export session transcript **Purpose:** Export a managed session's transcript to a file or stdout. Operates on the currently-resumed session (requires `--resume`). ```bash # Export latest session claw --resume latest export # Export specific session claw --resume export ``` **Prerequisite:** A managed session must exist under `.claw/sessions//`. If no sessions exist, the command exits with `error-kind: no_managed_sessions` and a hint to start a session first. **When to use:** - Archive session transcripts for review - Share session context with teammates - Feed session history into downstream tooling **Related:** Inside the REPL, `/export` is also available as a slash command for the active session. ## Session management REPL turns are persisted under `.claw/sessions/` in the current workspace. ```bash cd rust ./target/debug/claw --resume latest ./target/debug/claw --resume latest /status /diff ``` ### Interactive slash commands (inside the REPL) Useful interactive commands include: - `/help` — Show help for all available commands - `/status` — Display current session and workspace status - `/cost` — Show token usage and cost estimates for the session - `/config` — Display current configuration and environment state - `/session` — Show session ID, creation time, and persisted metadata - `/model` — Display or switch the active model - `/permissions` — Check sandbox permissions and capability grants - `/export [file]` — Export the current conversation to a file (or resume from backup) - `/ultraplan [task]` — Run a deep planning prompt with multi-step reasoning (good for complex refactoring tasks) - `/teleport ` — Jump to a file or symbol by searching the workspace (IDE-like navigation) - `/bughunter [scope]` — Inspect the codebase for likely bugs in an optional scope (e.g., `src/runtime`) - `/commit` — Generate a commit message and create a git commit from the conversation - `/pr [context]` — Draft or create a pull request from the conversation - `/issue [context]` — Draft or create a GitHub issue from the conversation - `/diff` — Show unified diff of changes made in the current session - `/plugin [list|install|enable|disable|uninstall|update]` — Manage Claw Code plugins - `/agents [list|help]` — List configured agents or get help on agent commands ## Config file resolution order Runtime config is loaded in this order, with later entries overriding earlier ones: 1. `~/.claw.json` 2. `~/.config/claw/settings.json` 3. `/.claw.json` 4. `/.claw/settings.json` 5. `/.claw/settings.local.json` ## Mock parity harness The workspace includes a deterministic Anthropic-compatible mock service and parity harness. ```bash cd rust ./scripts/run_mock_parity_harness.sh ``` Manual mock service startup: ```bash cd rust cargo run -p mock-anthropic-service -- --bind 127.0.0.1:0 ``` ## Verification ```bash cd rust cargo test --workspace ``` ## Workspace overview Current Rust crates: - `api` - `commands` - `compat-harness` - `mock-anthropic-service` - `plugins` - `runtime` - `rusty-claude-cli` - `telemetry` - `tools`