TrustClaw by Composio logo

TrustClaw by Composio

Your AI that does things while you sleep. Securely.

2026-05-15

Product Introduction

  1. Definition: TrustClaw by Composio is a self-hostable, open-source personal AI agent built on a modern web technology stack (Next.js 15, tRPC, Prisma). It is a technical platform designed to automate workflows and provide intelligent assistance by securely connecting to external applications.
  2. Core Value Proposition: It exists to provide a secure, production-ready alternative to locally run AI agents, enabling 24/7 automation and assistance through OAuth-based integrations with over 1,000 tools without compromising user credentials or local machine security.

Main Features

  1. Self-Hosting on Vercel: TrustClaw is designed for one-command deployment on the Vercel platform using the npx @composio/trustclaw deploy CLI. The deployment process automatically configures the environment and adjusts settings like cron job frequency based on the Vercel plan (Hobby vs. Pro).
  2. Secure OAuth Tool Integration: The agent connects to external services exclusively via OAuth flows managed by the Composio platform. This eliminates the need to store or handle raw API keys within the agent's codebase. Every tool action (e.g., sending an email via Gmail, creating a GitHub issue) is executed in an isolated, ephemeral sandbox environment on Composio's infrastructure, not on the user's local machine.
  3. Multi-Channel Interface & Persistent Memory: Users can interact with their TrustClaw agent through a dedicated Next.js web dashboard or a Telegram bot. The agent maintains long-term memory using a Postgres database with the pgvector extension for storing and retrieving conversation context via vector embeddings. It employs a 3-layer context management system (pruning, memory flush, summarization compaction) to enable indefinitely long-running conversations.
  4. Scheduled Autonomous Execution: Users can configure recurring tasks (cron jobs) that the agent will execute autonomously on a schedule. This allows for "set-and-forget" automation, such as daily digest emails or periodic data syncing, which continues to work even when the user is offline.
  5. Built-in Authentication & Security Model: The platform includes username/password authentication via Better Auth. Its foundational security model is architected to prevent common AI agent risks: no local code execution, no shell access, credential management via OAuth brokers, and full audit logs of all actions taken.

Problems Solved

  1. Pain Point: The security and operational complexity of running powerful AI agents locally. Traditional setups require managing dozens of API keys in plaintext configuration files, expose the local filesystem and shell to potential prompt injection attacks, and demand significant DevOps effort for a reliable, always-on agent.
  2. Target Audience: The primary user is a technical individual, such as a developer, founder, or IT professional, who wants to automate personal or work-related tasks across their SaaS ecosystem (like Gmail, GitHub, Slack, Notion) but is concerned about the security implications of giving an LLM direct API access. It also appeals to open-source enthusiasts looking for a modifiable, self-hosted automation hub.
  3. Use Cases: Essential scenarios include automating daily stand-up reports by fetching data from Linear and posting to Slack, managing a content calendar by drafting social posts and scheduling them, conducting automated research by summarizing incoming emails or RSS feeds, and providing a personal Telegram assistant for quick queries and task delegation.

Unique Advantages

  1. Differentiation: Compared to vanilla local agents (e.g., those built with LangChain or AutoGen directly), TrustClaw provides a fully managed deployment and security layer. Versus other cloud-based automation tools (like Zapier or Make), it offers the flexibility and context-awareness of a programmable AI agent with long-term memory, all within a self-hosted, open-source package.
  2. Key Innovation: The integration of the Composio tooling layer with a sandboxed execution environment. This combination is the core innovation: it provides the expansive toolset of a connected platform (1000+ apps) while enforcing a security boundary where all code runs remotely and ephemerally. This fundamentally shifts the threat model away from the user's personal device.

Frequently Asked Questions (FAQ)

  1. Is TrustClaw free to use? The TrustClaw source code is MIT-licensed and free to self-host. However, operational costs are incurred for the LLM/embedding calls (through Vercel AI Gateway) and for tool executions (through Composio), depending on your usage volume. The Vercel Hobby plan has functional limitations for cron jobs and timeout durations.
  2. How does TrustClaw handle my login credentials for Gmail or GitHub? TrustClaw never sees or stores your passwords or direct API keys. It uses OAuth, a secure standard where you grant permission directly to Composio to act on your behalf. Composio manages the secure OAuth tokens, and TrustClaw simply requests actions through the Composio SDK, which executes them in its isolated sandbox.
  3. Can I run TrustClaw completely locally without Vercel? While designed for Vercel deployment, the codebase can be run locally for development (pnpm dev). However, key features like the AI Gateway integration and easy cron scheduling are optimized for the Vercel platform. A fully local production deployment would require setting up alternative providers for LLMs, embeddings, and job scheduling.
  4. What prevents a malicious prompt from deleting my files or data? The agent has no direct access to your local filesystem, shell, or database. Even if a prompt injection instructs it to rm -rf, the command executes within Composio's short-lived, isolated sandbox environment that contains none of your personal data or infrastructure, rendering such attacks harmless.
  5. Can I add custom tools or integrations to TrustClaw? Yes, as an open-source platform, you can modify the code to add new capabilities. For tool integrations, you can create custom actions within the Composio platform and then call them via the SDK, or you can implement entirely new backend functions within the tRPC router of the TrustClaw codebase itself.

Subscribe to Our Newsletter

Get weekly curated tool recommendations and stay updated with the latest product news