Android App
Android App (Node)
Section titled “Android App (Node)”Note: The Android app has not been publicly released yet. The source code is available in the OpenClaw repository under
apps/android. You can build it yourself using Java 17 and the Android SDK (./gradlew :app:assemblePlayDebug). See apps/android/README.md for build instructions.
Support snapshot
Section titled “Support snapshot”- Role: companion node app (Android does not host the Gateway).
- Gateway required: yes (run it on macOS, Linux, or Windows via WSL2).
- Install: Getting Started + Pairing.
- Gateway: Runbook + Configuration.
- Protocols: Gateway protocol (nodes + control plane).
System control
Section titled “System control”System control (launchd/systemd) lives on the Gateway host. See Gateway.
Connection Runbook
Section titled “Connection Runbook”Android node app ⇄ (mDNS/NSD + WebSocket) ⇄ Gateway
Android connects directly to the Gateway WebSocket (default ws://<host>:18789) and uses device pairing (role: node).
Prerequisites
Section titled “Prerequisites”- You can run the Gateway on the “master” machine.
- Android device/emulator can reach the gateway WebSocket:
- Same LAN with mDNS/NSD, or
- Same Tailscale tailnet using Wide-Area Bonjour / unicast DNS-SD (see below), or
- Manual gateway host/port (fallback)
- You can run the CLI (
openclaw) on the gateway machine (or via SSH).
1) Start the Gateway
Section titled “1) Start the Gateway”openclaw gateway --port 18789 --verboseConfirm in logs you see something like:
listening on ws://0.0.0.0:18789
For tailnet-only setups (recommended for Vienna ⇄ London), bind the gateway to the tailnet IP:
- Set
gateway.bind: "tailnet"in~/.openclaw/openclaw.jsonon the gateway host. - Restart the Gateway / macOS menubar app.
2) Verify discovery (optional)
Section titled “2) Verify discovery (optional)”From the gateway machine:
dns-sd -B _openclaw-gw._tcp local.More debugging notes: Bonjour.
Tailnet (Vienna ⇄ London) discovery via unicast DNS-SD
Section titled “Tailnet (Vienna ⇄ London) discovery via unicast DNS-SD”Android NSD/mDNS discovery won’t cross networks. If your Android node and the gateway are on different networks but connected via Tailscale, use Wide-Area Bonjour / unicast DNS-SD instead:
- Set up a DNS-SD zone (example
openclaw.internal.) on the gateway host and publish_openclaw-gw._tcprecords. - Configure Tailscale split DNS for your chosen domain pointing at that DNS server.
Details and example CoreDNS config: Bonjour.
3) Connect from Android
Section titled “3) Connect from Android”In the Android app:
- The app keeps its gateway connection alive via a foreground service (persistent notification).
- Open the Connect tab.
- Use Setup Code or Manual mode.
- If discovery is blocked, use manual host/port (and TLS/token/password when required) in Advanced controls.
After the first successful pairing, Android auto-reconnects on launch:
- Manual endpoint (if enabled), otherwise
- The last discovered gateway (best-effort).
4) Approve pairing (CLI)
Section titled “4) Approve pairing (CLI)”On the gateway machine:
openclaw devices listopenclaw devices approve <requestId>openclaw devices reject <requestId>Pairing details: Pairing.
5) Verify the node is connected
Section titled “5) Verify the node is connected”-
Via nodes status:
Terminal window openclaw nodes status -
Via Gateway:
Terminal window openclaw gateway call node.list --params "{}"
6) Chat + history
Section titled “6) Chat + history”The Android Chat tab supports session selection (default main, plus other existing sessions):
- History:
chat.history - Send:
chat.send - Push updates (best-effort):
chat.subscribe→event:"chat"
7) Canvas + camera
Section titled “7) Canvas + camera”Gateway Canvas Host (recommended for web content)
Section titled “Gateway Canvas Host (recommended for web content)”If you want the node to show real HTML/CSS/JS that the agent can edit on disk, point the node at the Gateway canvas host.
Note: nodes load canvas from the Gateway HTTP server (same port as gateway.port, default 18789).
-
Create
~/.openclaw/workspace/canvas/index.htmlon the gateway host. -
Navigate the node to it (LAN):
openclaw nodes invoke --node "<Android Node>" --command canvas.navigate --params '{"url":"http://<gateway-hostname>.local:18789/__openclaw__/canvas/"}'Tailnet (optional): if both devices are on Tailscale, use a MagicDNS name or tailnet IP instead of .local, e.g. http://<gateway-magicdns>:18789/__openclaw__/canvas/.
This server injects a live-reload client into HTML and reloads on file changes.
The A2UI host lives at http://<gateway-host>:18789/__openclaw__/a2ui/.
Canvas commands (foreground only):
canvas.eval,canvas.snapshot,canvas.navigate(use{"url":""}or{"url":"/"}to return to the default scaffold).canvas.snapshotreturns{ format, base64 }(defaultformat="jpeg").- A2UI:
canvas.a2ui.push,canvas.a2ui.reset(canvas.a2ui.pushJSONLlegacy alias)
Camera commands (foreground only; permission-gated):
camera.snap(jpg)camera.clip(mp4)
See Camera node for parameters and CLI helpers.
8) Voice + expanded Android command surface
Section titled “8) Voice + expanded Android command surface”- Voice: Android uses a single mic on/off flow in the Voice tab with transcript capture and TTS playback (ElevenLabs when configured, system TTS fallback). Voice stops when the app leaves the foreground.
- Voice wake/talk-mode toggles are currently removed from Android UX/runtime.
- Additional Android command families (availability depends on device + permissions):
device.status,device.info,device.permissions,device.healthnotifications.list,notifications.actions(see Notification forwarding below)photos.latestcontacts.search,contacts.addcalendar.events,calendar.addcallLog.searchsms.searchmotion.activity,motion.pedometer
Assistant entrypoints
Section titled “Assistant entrypoints”Android supports launching OpenClaw from the system assistant trigger (Google Assistant). When configured, holding the home button or saying “Hey Google, ask OpenClaw…” opens the app and hands the prompt into the chat composer.
This uses Android App Actions metadata declared in the app manifest. No extra configuration is needed on the gateway side — the assistant intent is handled entirely by the Android app and forwarded as a normal chat message.
Notification forwarding
Section titled “Notification forwarding”Android can forward device notifications to the gateway as events. Several controls let you scope which notifications are forwarded and when.
| Key | Type | Description |
|---|---|---|
notifications.allowPackages | string[] | Only forward notifications from these package names. If set, all other packages are ignored. |
notifications.denyPackages | string[] | Never forward notifications from these package names. Applied after allowPackages. |
notifications.quietHours.start | string (HH:mm) | Start of quiet hours window (local device time). Notifications are suppressed during this window. |
notifications.quietHours.end | string (HH:mm) | End of quiet hours window. |
notifications.rateLimit | number | Maximum forwarded notifications per package per minute. Excess notifications are dropped. |
The notification picker also uses safer behavior for forwarded notification events, preventing accidental forwarding of sensitive system notifications.
Example configuration:
{ notifications: { allowPackages: ["com.slack", "com.whatsapp"], denyPackages: ["com.android.systemui"], quietHours: { start: "22:00", end: "07:00", }, rateLimit: 5, },}