Session
Build Your Own OpenClaw
If you can’t explain how your assistant works, you can’t safely trust it. In this hands-on workshop, participants build an OpenClaw-style assistant from scratch to understand every critical layer: runtime architecture, state handling, tool execution, and security controls.
We’ll walk through real threat surfaces and implementation tradeoffs, including sandboxing, least-privilege tooling, memory boundaries, and failure recovery. The goal is not feature breadth, but architectural clarity and operational confidence.
You’ll leave with a minimal working system and the ability to reason about its safety, limitations, and trust profile before deployment.
Dev Agrawal
Developer Relations Engineer, PowerSync
Wichita, Kansas, United States
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top