Pinpoint #155: USAGE.md was missing documentation for three interactive commands that appear in `claw --help`: - /ultraplan [task] - /teleport <symbol-or-path> - /bughunter [scope] Also adds full documentation for other underdocumented commands: - /commit, /pr, /issue, /diff, /plugin, /agents Converts inline sentence list into structured section 'Interactive slash commands (inside the REPL)' with brief descriptions for each command. Closes #155 gap: discovered during dogfood probing of help/USAGE parity. No code changes. Pure documentation update.
25 KiB
Claw Code Usage
This guide covers the current Rust workspace under rust/ and the claw CLI binary. If you are brand new, make the doctor health check your first run: start claw, then run /doctor.
Tip
Building orchestration code that calls
clawas a subprocess? SeeERROR_HANDLING.mdfor the unified error-handling pattern (one handler for all 14 clawable commands, exit codes, JSON envelope contract, and recovery strategies).
Quick-start health check
Run this before prompts, sessions, or automation:
cd rust
cargo build --workspace
./target/debug/claw
# first command inside the REPL
/doctor
/doctor is the built-in setup and preflight diagnostic. Once you have a saved session, you can rerun it with ./target/debug/claw --resume latest /doctor.
Prerequisites
- Rust toolchain with
cargo - One of:
ANTHROPIC_API_KEYfor direct API accessANTHROPIC_AUTH_TOKENfor bearer-token auth
- Optional:
ANTHROPIC_BASE_URLwhen targeting a proxy or local service
Install / build the workspace
cd rust
cargo build --workspace
The CLI binary is available at rust/target/debug/claw after a debug build. Make the doctor check above your first post-build step.
Quick start
First-run doctor check
cd rust
./target/debug/claw
/doctor
Or run doctor directly with JSON output for scripting:
cd rust
./target/debug/claw doctor --output-format json
Note: Diagnostic verbs (doctor, status, sandbox, version) support --output-format json for machine-readable output. Invalid suffix arguments (e.g., --json) are now rejected at parse time rather than falling through to prompt dispatch.
Initialize a repository
Set up a new repository with .claw config, .claw.json, .gitignore entries, and a CLAUDE.md guidance file:
cd /path/to/your/repo
./target/debug/claw init
Text mode (human-readable) shows artifact creation summary with project path and next steps. Idempotent — running multiple times in the same repo marks already-created files as "skipped".
JSON mode for scripting:
./target/debug/claw init --output-format json
Returns structured output with project_path, created[], updated[], skipped[] arrays (one per artifact), and artifacts[] carrying each file's name and machine-stable status tag. The legacy message field preserves backward compatibility.
Why structured fields matter: Claws can detect per-artifact state (created vs updated vs skipped) without substring-matching human prose. Use the created[], updated[], and skipped[] arrays for conditional follow-up logic (e.g., only commit if files were actually created, not just updated).
Interactive REPL
cd rust
./target/debug/claw
One-shot prompt
cd rust
./target/debug/claw prompt "summarize this repository"
Shorthand prompt mode
cd rust
./target/debug/claw "explain rust/crates/runtime/src/lib.rs"
JSON output for scripting
All clawable commands support --output-format json for machine-readable output.
IMPORTANT SCHEMA VERSION NOTICE:
The JSON envelope is currently in v1.0 (flat shape) and is scheduled to migrate to v2.0 (nested schema) in a future release. See FIX_LOCUS_164.md for the full migration plan.
Current (v1.0) envelope shape
Success envelope — verb-specific fields + kind: "<verb-name>":
{
"kind": "doctor",
"checks": [...],
"summary": {...},
"has_failures": false,
"report": "...",
"message": "..."
}
Error envelope — flat error fields at top level:
{
"error": "unrecognized argument `foo`",
"hint": "Run `claw --help` for usage.",
"kind": "cli_parse",
"type": "error"
}
Known issues with v1.0:
- Missing
exit_code,command,timestamp,output_format,schema_versionfields erroris a string, not a structured object with operation/target/retryable/message/hintkindfield is semantically overloaded (verb identity in success, error classification in error)- See
SCHEMAS.mdfor documented (v2.0 target) schema andFIX_LOCUS_164.mdfor migration details
Using v1.0 envelopes in your code
Success path: Check for absence of type: "error", then access verb-specific fields:
cd rust
./target/debug/claw doctor --output-format json | jq '.kind, .has_failures'
Error path: Check for type == "error", then access error (string) and kind (error classification):
cd rust
./target/debug/claw doctor invalid-arg --output-format json | jq '.error, .kind'
Do NOT rely on kind alone for dispatching — it has different meanings in success vs. error. Always check type == "error" first.
cd rust
./target/debug/claw --output-format json prompt "status"
./target/debug/claw --output-format json load-session my-session-id
./target/debug/claw --output-format json turn-loop "analyze logs" --max-turns 1
Building a dispatcher or orchestration script? See ERROR_HANDLING.md for the unified error-handling pattern. One code example works for all 14 clawable commands: parse the exit code, classify by error.kind, apply recovery strategies (retry, timeout recovery, validation, logging). Use that pattern instead of reimplementing error handling per command.
Migrating to v2.0? Check back after FIX_LOCUS_164 is implemented. Phase 1 will add a --envelope-version=2.0 flag for opt-in access to the structured envelope schema. Phase 2 will make v2.0 the default. Phase 3 will deprecate v1.0.
Inspect worker state
The claw state command reads .claw/worker-state.json, which is written by the interactive REPL or a one-shot prompt when a worker executes a task. This file contains the worker ID, session reference, model, and permission mode.
Prerequisite: You must run claw (interactive REPL) or claw prompt <text> at least once in the repository to produce the worker state file.
cd rust
./target/debug/claw state
JSON mode:
./target/debug/claw state --output-format json
If you run claw state before any worker has executed, you will see a helpful error:
error: no worker state file found at .claw/worker-state.json
Hint: worker state is written by the interactive REPL or a non-interactive prompt.
Run: claw # start the REPL (writes state on first turn)
Or: claw prompt <text> # run one non-interactive turn
Then rerun: claw state [--output-format json]
Advanced slash commands (Interactive REPL only)
These commands are available inside the interactive REPL (claw with no args). They extend the assistant with workspace analysis, planning, and navigation features.
/ultraplan — Deep planning with multi-step reasoning
Purpose: Break down a complex task into steps using extended reasoning.
# Start the REPL
claw
# Inside the REPL
/ultraplan refactor the auth module to use async/await
/ultraplan design a caching layer for database queries
/ultraplan analyze this module for performance bottlenecks
Output: A structured plan with numbered steps, reasoning for each step, and expected outcomes. Use this when you want the assistant to think through a problem in detail before coding.
/teleport — Jump to a file or symbol
Purpose: Quickly navigate to a file, function, class, or struct by name.
# Jump to a symbol
/teleport UserService
/teleport authenticate_user
/teleport RequestHandler
# Jump to a file
/teleport src/auth.rs
/teleport crates/runtime/lib.rs
/teleport ./ARCHITECTURE.md
Output: The file content, with the requested symbol highlighted or the file fully loaded. Useful for exploring the codebase without manually navigating directories. If multiple matches exist, the assistant shows the top candidates.
/bughunter — Scan for likely bugs and issues
Purpose: Analyze code for common pitfalls, anti-patterns, and potential bugs.
# Scan the entire workspace
/bughunter
# Scan a specific directory or file
/bughunter src/handlers
/bughunter rust/crates/runtime
/bughunter src/auth.rs
Output: A list of suspicious patterns with explanations (e.g., "unchecked unwrap()", "potential race condition", "missing error handling"). Each finding includes the file, line number, and suggested fix. Use this as a first pass before a full code review.
Model and permission controls
cd rust
./target/debug/claw --model sonnet prompt "review this diff"
./target/debug/claw --permission-mode read-only prompt "summarize Cargo.toml"
./target/debug/claw --permission-mode workspace-write prompt "update README.md"
./target/debug/claw --allowedTools read,glob "inspect the runtime crate"
Supported permission modes:
read-onlyworkspace-writedanger-full-access
Model aliases currently supported by the CLI:
opus→claude-opus-4-6sonnet→claude-sonnet-4-6haiku→claude-haiku-4-5-20251213
Authentication
API key
export ANTHROPIC_API_KEY="sk-ant-..."
OAuth
cd rust
export ANTHROPIC_AUTH_TOKEN="anthropic-oauth-or-proxy-bearer-token"
Which env var goes where
claw accepts two Anthropic credential env vars and they are not interchangeable — the HTTP header Anthropic expects differs per credential shape. Putting the wrong value in the wrong slot is the most common 401 we see.
| Credential shape | Env var | HTTP header | Typical source |
|---|---|---|---|
sk-ant-* API key |
ANTHROPIC_API_KEY |
x-api-key: sk-ant-... |
console.anthropic.com |
| OAuth access token (opaque) | ANTHROPIC_AUTH_TOKEN |
Authorization: Bearer ... |
an Anthropic-compatible proxy or OAuth flow that mints bearer tokens |
OpenRouter key (sk-or-v1-*) |
OPENAI_API_KEY + OPENAI_BASE_URL=https://openrouter.ai/api/v1 |
Authorization: Bearer ... |
openrouter.ai/keys |
Why this matters: if you paste an sk-ant-* key into ANTHROPIC_AUTH_TOKEN, Anthropic's API will return 401 Invalid bearer token because sk-ant-* keys are rejected over the Bearer header. The fix is a one-line env var swap — move the key to ANTHROPIC_API_KEY. Recent claw builds detect this exact shape (401 + sk-ant-* in the Bearer slot) and append a hint to the error message pointing at the fix.
If you meant a different provider: if claw reports missing Anthropic credentials but you already have OPENAI_API_KEY, XAI_API_KEY, or DASHSCOPE_API_KEY exported, you most likely forgot to prefix the model name with the provider's routing prefix. Use --model openai/gpt-4.1-mini (OpenAI-compat / OpenRouter / Ollama), --model grok (xAI), or --model qwen-plus (DashScope) and the prefix router will select the right backend regardless of the ambient credentials. The error message now includes a hint that names the detected env var.
Local Models
claw can talk to local servers and provider gateways through either Anthropic-compatible or OpenAI-compatible endpoints. Use ANTHROPIC_BASE_URL with ANTHROPIC_AUTH_TOKEN for Anthropic-compatible services, or OPENAI_BASE_URL with OPENAI_API_KEY for OpenAI-compatible services.
Anthropic-compatible endpoint
export ANTHROPIC_BASE_URL="http://127.0.0.1:8080"
export ANTHROPIC_AUTH_TOKEN="local-dev-token"
cd rust
./target/debug/claw --model "claude-sonnet-4-6" prompt "reply with the word ready"
OpenAI-compatible endpoint
export OPENAI_BASE_URL="http://127.0.0.1:8000/v1"
export OPENAI_API_KEY="local-dev-token"
cd rust
./target/debug/claw --model "qwen2.5-coder" prompt "reply with the word ready"
Ollama
export OPENAI_BASE_URL="http://127.0.0.1:11434/v1"
unset OPENAI_API_KEY
cd rust
./target/debug/claw --model "llama3.2" prompt "summarize this repository in one sentence"
OpenRouter
export OPENAI_BASE_URL="https://openrouter.ai/api/v1"
export OPENAI_API_KEY="sk-or-v1-..."
cd rust
./target/debug/claw --model "openai/gpt-4.1-mini" prompt "summarize this repository in one sentence"
Alibaba DashScope (Qwen)
For Qwen models via Alibaba's native DashScope API (higher rate limits than OpenRouter):
export DASHSCOPE_API_KEY="sk-..."
cd rust
./target/debug/claw --model "qwen/qwen-max" prompt "hello"
# or bare:
./target/debug/claw --model "qwen-plus" prompt "hello"
Model names starting with qwen/ or qwen- are automatically routed to the DashScope compatible-mode endpoint (https://dashscope.aliyuncs.com/compatible-mode/v1). You do not need to set OPENAI_BASE_URL or unset ANTHROPIC_API_KEY — the model prefix wins over the ambient credential sniffer.
Reasoning variants (qwen-qwq-*, qwq-*, *-thinking) automatically strip temperature/top_p/frequency_penalty/presence_penalty before the request hits the wire (these params are rejected by reasoning models).
Supported Providers & Models
claw has three built-in provider backends. The provider is selected automatically based on the model name, falling back to whichever credential is present in the environment.
Provider matrix
| Provider | Protocol | Auth env var(s) | Base URL env var | Default base URL |
|---|---|---|---|---|
| Anthropic (direct) | Anthropic Messages API | ANTHROPIC_API_KEY or ANTHROPIC_AUTH_TOKEN |
ANTHROPIC_BASE_URL |
https://api.anthropic.com |
| xAI | OpenAI-compatible | XAI_API_KEY |
XAI_BASE_URL |
https://api.x.ai/v1 |
| OpenAI-compatible | OpenAI Chat Completions | OPENAI_API_KEY |
OPENAI_BASE_URL |
https://api.openai.com/v1 |
| DashScope (Alibaba) | OpenAI-compatible | DASHSCOPE_API_KEY |
DASHSCOPE_BASE_URL |
https://dashscope.aliyuncs.com/compatible-mode/v1 |
The OpenAI-compatible backend also serves as the gateway for OpenRouter, Ollama, and any other service that speaks the OpenAI /v1/chat/completions wire format — just point OPENAI_BASE_URL at the service.
Model-name prefix routing: If a model name starts with openai/, gpt-, qwen/, or qwen-, the provider is selected by the prefix regardless of which env vars are set. This prevents accidental misrouting to Anthropic when multiple credentials exist in the environment.
Tested models and aliases
These are the models registered in the built-in alias table with known token limits:
| Alias | Resolved model name | Provider | Max output tokens | Context window |
|---|---|---|---|---|
opus |
claude-opus-4-6 |
Anthropic | 32 000 | 200 000 |
sonnet |
claude-sonnet-4-6 |
Anthropic | 64 000 | 200 000 |
haiku |
claude-haiku-4-5-20251213 |
Anthropic | 64 000 | 200 000 |
grok / grok-3 |
grok-3 |
xAI | 64 000 | 131 072 |
grok-mini / grok-3-mini |
grok-3-mini |
xAI | 64 000 | 131 072 |
grok-2 |
grok-2 |
xAI | — | — |
Any model name that does not match an alias is passed through verbatim. This is how you use OpenRouter model slugs (openai/gpt-4.1-mini), Ollama tags (llama3.2), or full Anthropic model IDs (claude-sonnet-4-20250514).
User-defined aliases
You can add custom aliases in any settings file (~/.claw/settings.json, .claw/settings.json, or .claw/settings.local.json):
{
"aliases": {
"fast": "claude-haiku-4-5-20251213",
"smart": "claude-opus-4-6",
"cheap": "grok-3-mini"
}
}
Local project settings override user-level settings. Aliases resolve through the built-in table, so "fast": "haiku" also works.
How provider detection works
- If the resolved model name starts with
claude→ Anthropic. - If it starts with
grok→ xAI. - Otherwise,
clawchecks which credential is set:ANTHROPIC_API_KEY/ANTHROPIC_AUTH_TOKENfirst, thenOPENAI_API_KEY, thenXAI_API_KEY. - If nothing matches, it defaults to Anthropic.
FAQ
What about Codex?
The name "codex" appears in the Claw Code ecosystem but it does not refer to OpenAI Codex (the code-generation model). Here is what it means in this project:
oh-my-codex(OmX) is the workflow and plugin layer that sits on top ofclaw. It provides planning modes, parallel multi-agent execution, notification routing, and other automation features. See PHILOSOPHY.md and the oh-my-codex repo..codex/directories (e.g..codex/skills,.codex/agents,.codex/commands) are legacy lookup paths thatclawstill scans alongside the primary.claw/directories.CODEX_HOMEis an optional environment variable that points to a custom root for user-level skill and command lookups.
claw does not support OpenAI Codex sessions, the Codex CLI, or Codex session import/export. If you need to use OpenAI models (like GPT-4.1), configure the OpenAI-compatible provider as shown above in the OpenAI-compatible endpoint and OpenRouter sections.
HTTP proxy support
claw honours the standard HTTP_PROXY, HTTPS_PROXY, and NO_PROXY environment variables (both upper- and lower-case spellings are accepted) when issuing outbound requests to Anthropic, OpenAI-, and xAI-compatible endpoints. Set them before launching the CLI and the underlying reqwest client will be configured automatically.
Environment variables
export HTTPS_PROXY="http://proxy.corp.example:3128"
export HTTP_PROXY="http://proxy.corp.example:3128"
export NO_PROXY="localhost,127.0.0.1,.corp.example"
cd rust
./target/debug/claw prompt "hello via the corporate proxy"
Programmatic proxy_url config option
As an alternative to per-scheme environment variables, the ProxyConfig type exposes a proxy_url field that acts as a single catch-all proxy for both HTTP and HTTPS traffic. When proxy_url is set it takes precedence over the separate http_proxy and https_proxy fields.
use api::{build_http_client_with, ProxyConfig};
// From a single unified URL (config file, CLI flag, etc.)
let config = ProxyConfig::from_proxy_url("http://proxy.corp.example:3128");
let client = build_http_client_with(&config).expect("proxy client");
// Or set the field directly alongside NO_PROXY
let config = ProxyConfig {
proxy_url: Some("http://proxy.corp.example:3128".to_string()),
no_proxy: Some("localhost,127.0.0.1".to_string()),
..ProxyConfig::default()
};
let client = build_http_client_with(&config).expect("proxy client");
Notes
- When both
HTTPS_PROXYandHTTP_PROXYare set, the secure proxy applies tohttps://URLs and the plain proxy applies tohttp://URLs. proxy_urlis a unified alternative: when set, it applies to bothhttp://andhttps://destinations, overriding the per-scheme fields.NO_PROXYaccepts a comma-separated list of host suffixes (for example.corp.example) and IP literals.- Empty values are treated as unset, so leaving
HTTPS_PROXY=""in your shell will not enable a proxy. - If a proxy URL cannot be parsed,
clawfalls back to a direct (no-proxy) client so existing workflows keep working; double-check the URL if you expected the request to be tunnelled.
Common operational commands
cd rust
./target/debug/claw status
./target/debug/claw sandbox
./target/debug/claw agents
./target/debug/claw mcp
./target/debug/claw skills
./target/debug/claw system-prompt --cwd .. --date 2026-04-04
dump-manifests — Export upstream plugin/MCP manifests
Purpose: Dump built-in tool and plugin manifests to stdout as JSON, for parity comparison against the upstream Claude Code TypeScript implementation.
Prerequisite: This command requires access to upstream source files (src/commands.ts, src/tools.ts, src/entrypoints/cli.tsx). Set CLAUDE_CODE_UPSTREAM env var or pass --manifests-dir.
# Via env var
CLAUDE_CODE_UPSTREAM=/path/to/upstream claw dump-manifests
# Via flag
claw dump-manifests --manifests-dir /path/to/upstream
When to use: Parity work (comparing the Rust port's tool/plugin surface against the canonical TypeScript implementation). Not needed for normal operation.
Error mode: If upstream sources are missing, exits with error-kind: missing_manifests and a hint about how to provide them.
bootstrap-plan — Show startup component graph
Purpose: Print the ordered list of startup components that are initialized when claw begins a session. Useful for debugging startup issues or verifying that fast-path optimizations are in place.
claw bootstrap-plan
Sample output:
- CliEntry
- FastPathVersion
- StartupProfiler
- SystemPromptFastPath
- ChromeMcpFastPath
When to use:
- Debugging why startup is slow (compare your plan to the expected one)
- Verifying that fast-path components are registered
- Understanding the load order before customizing hooks or plugins
Related: See claw doctor for health checks against these startup components.
acp — Agent Context Protocol / Zed editor integration status
Purpose: Report the current state of the ACP (Agent Context Protocol) / Zed editor integration. Currently discoverability only — no editor daemon is available yet.
claw acp
claw acp serve # same output; `serve` is accepted but not yet launchable
claw --acp # alias
claw -acp # alias
Sample output:
ACP / Zed
Status discoverability only
Launch `claw acp serve` / `claw --acp` / `claw -acp` report status only; no editor daemon is available yet
Today use `claw prompt`, the REPL, or `claw doctor` for local verification
Tracking ROADMAP #76
When to use: Check whether ACP/Zed integration is ready in your current build. Plan around its availability (track ROADMAP #76 for status).
Today's alternatives: Use claw prompt for one-shot runs, the interactive REPL for iterative work, or claw doctor for local verification.
export — Export session transcript
Purpose: Export a managed session's transcript to a file or stdout. Operates on the currently-resumed session (requires --resume).
# Export latest session
claw --resume latest export
# Export specific session
claw --resume <session-id> export
Prerequisite: A managed session must exist under .claw/sessions/<workspace-fingerprint>/. If no sessions exist, the command exits with error-kind: no_managed_sessions and a hint to start a session first.
When to use:
- Archive session transcripts for review
- Share session context with teammates
- Feed session history into downstream tooling
Related: Inside the REPL, /export is also available as a slash command for the active session.
Session management
REPL turns are persisted under .claw/sessions/ in the current workspace.
cd rust
./target/debug/claw --resume latest
./target/debug/claw --resume latest /status /diff
Interactive slash commands (inside the REPL)
Useful interactive commands include:
/help— Show help for all available commands/status— Display current session and workspace status/cost— Show token usage and cost estimates for the session/config— Display current configuration and environment state/session— Show session ID, creation time, and persisted metadata/model— Display or switch the active model/permissions— Check sandbox permissions and capability grants/export [file]— Export the current conversation to a file (or resume from backup)/ultraplan [task]— Run a deep planning prompt with multi-step reasoning (good for complex refactoring tasks)/teleport <symbol-or-path>— Jump to a file or symbol by searching the workspace (IDE-like navigation)/bughunter [scope]— Inspect the codebase for likely bugs in an optional scope (e.g.,src/runtime)/commit— Generate a commit message and create a git commit from the conversation/pr [context]— Draft or create a pull request from the conversation/issue [context]— Draft or create a GitHub issue from the conversation/diff— Show unified diff of changes made in the current session/plugin [list|install|enable|disable|uninstall|update]— Manage Claw Code plugins/agents [list|help]— List configured agents or get help on agent commands
Config file resolution order
Runtime config is loaded in this order, with later entries overriding earlier ones:
~/.claw.json~/.config/claw/settings.json<repo>/.claw.json<repo>/.claw/settings.json<repo>/.claw/settings.local.json
Mock parity harness
The workspace includes a deterministic Anthropic-compatible mock service and parity harness.
cd rust
./scripts/run_mock_parity_harness.sh
Manual mock service startup:
cd rust
cargo run -p mock-anthropic-service -- --bind 127.0.0.1:0
Verification
cd rust
cargo test --workspace
Workspace overview
Current Rust crates:
apicommandscompat-harnessmock-anthropic-servicepluginsruntimerusty-claude-clitelemetrytools