TL;DR
If you only read one line: Hermes Agent is the safe default in 2026 for most self-hosters. Nanobot if you want to read the entire codebase before trusting it. NanoClaw if you're on macOS. IronClaw if you're in a regulated industry. ZeroClaw if you don't want any cloud touching your data, ever.
The full breakdown is below. We installed each on a $20/month VPS (Hetzner CX22), ran the same five tasks, and graded them on setup, security, capability, and operational pain.
The contenders
| Agent | Origin | First release | License | Stars | Default sandbox |
|---|---|---|---|---|---|
| Hermes Agent | Nous Research | Feb 2026 | Apache 2.0 | ~22k | Docker |
| Nanobot | HKU | Jan 2026 | MIT | ~26.8k | None (read-only by default) |
| NanoClaw | community fork | Mar 2026 | Apache 2.0 | ~9k | Apple containers |
| IronClaw | enterprise vendor | Mar 2026 | source-available | ~3k | gVisor + zero-trust |
| ZeroClaw | privacy collective | Feb 2026 | AGPL-3.0 | ~14k | Local-only, no network egress |
We're skipping anything that hit GitHub after April 1. Too early to tell.
1. Hermes Agent — the safe default
Nous Research shipped Hermes in February to do what OpenClaw should have done from day one: run the agent in Docker by default, with explicit allowlists for network egress, file paths, and tool execution.
What's good:
- One-line setup:
curl -sSL https://hermes.nousresearch.com/install | bash - Sandbox is on by default. To turn it off you have to edit a config file with
- Multi-LLM out of the box: Claude, GPT-4, Gemini, Llama via Ollama.
- Approval flow is sane — every tool call surfaces in the UI before execution,
What's not:
- The Docker image is 1.4 GB. On a $5/month VPS with 1 GB RAM you'll be
- The browser tool needs Chromium installed in the container — another 800 MB.
- Documentation is good but assumes you know Docker. Newcomers will struggle.
Verdict. If you have 4 GB of RAM and basic Docker fluency, Hermes Agent is the agent we'd hand a colleague today.
2. Nanobot — the readable one
Nanobot is a 4,000-line Python project out of HKU that delivers ~80% of OpenClaw's core in a fraction of the code. The whole codebase fits in one tab and you can audit it in an afternoon.
What's good:
- You can actually read the whole thing. This is rare in 2026.
- Minimal dependencies. Pure Python +
httpx+ a 200-line tool runner. - Trivial to extend — adding a custom tool is 30 lines of code.
- Apache 2.0, no enterprise tier, no rug-pull risk.
What's not:
- No sandbox. The default mode is "do everything as the current user." For some
- Single-user only. There's no auth layer. If you want a team agent, you're
- Provider support is thin: OpenAI-compatible endpoints only. Anthropic users
Verdict. Nanobot is the right pick if you trust nothing and want to verify everything. It's the wrong pick if you need a turnkey product.
3. NanoClaw — the macOS option
NanoClaw is a community fork that survived the OpenClaw crisis by being honest about what it is: a Claude-only agent for Apple Silicon Macs, sandboxed in Apple's container framework.
What's good:
- Native macOS. Installs from a
.pkg. No Docker, no Python venv. - Apple's container sandbox is genuinely strong — better than Docker on macOS.
- Anthropic-only means tight integration. No multi-provider abstraction tax.
- Surprisingly fast. Boots in under a second.
What's not:
- macOS-only. Linux users can stop reading.
- Anthropic-only. If Claude is down or your bill spikes, you're stuck.
- Smaller ecosystem. Fewer pre-built tools, no community marketplace.
Verdict. If you're a Mac developer with a Claude subscription, NanoClaw is borderline a no-brainer. If you're not, it's not for you.
4. IronClaw — the enterprise option
IronClaw is the agent for "we have a CISO" environments. Zero-trust by default, gVisor sandbox, full audit log, RBAC, SAML SSO, the whole thing.
What's good:
- Audit log is immutable and hash-chained. Required reading for SOC 2 anyway.
- gVisor sandbox is paranoid. Real syscall interposition.
- Air-gap mode that genuinely works: no telemetry, no auto-update, no calls
- Active vulnerability disclosure program with bounties.
What's not:
- Source-available, not open source. The license forbids competing products.
- $750/seat/year. Not a typo. There's no community tier.
- Setup is a multi-day project even with the install scripts.
- Ecosystem is tiny. Most community tools don't work without porting.
Verdict. If you're in finance, healthcare, or government, IronClaw is probably your only viable option. Everyone else, skip.
5. ZeroClaw — the privacy-first option
ZeroClaw is the answer to "what if the agent never touched the cloud?" It runs entirely on local models via Ollama or llama.cpp, with network egress disabled by default at the iptables level.
What's good:
- Zero cloud dependency. No API keys. No telemetry. No phoning home.
- AGPL-3.0 means any hosted version has to publish source.
- Defaults to Llama 3.3 70B on local hardware. Works on a Mac with 64 GB unified
- Bundles a clean offline RAG implementation — just point it at a folder.
What's not:
- Local LLMs are still meaningfully worse than Claude or GPT-4 for complex
- Hardware floor is real: 64 GB RAM minimum for usable models.
- Setup involves model downloads measured in tens of gigabytes.
Verdict. If your data can't leave the machine, ZeroClaw is the only honest choice. Just budget the hardware.
The summary table
| Need | Pick |
|---|---|
| "I want to install something today and have it just work." | Hermes Agent |
| "I want to read every line of code I run." | Nanobot |
| "I'm on a Mac and I love Claude." | NanoClaw |
| "We have a CISO and a procurement process." | IronClaw |
| "My data can't touch the cloud." | ZeroClaw |
| "I want to keep using OpenClaw." | Update to 2026.4+ and read the [security crisis post](/guides/openclaw-security-crisis-2026) first. |
What about LangChain agents, AutoGPT, BabyAGI…
The classic 2023-2024 agent frameworks still exist, but they're not in the same category. They're toolkits to build your own agent. The five above are products you install and run. Different problem.
If you have specific agent needs that none of these hit — multi-agent coordination, long-running research, very specific tool integrations — the toolkit route is probably where you want to be. We'll cover that separately.
Migration help
If you're on OpenClaw and ready to switch, we wrote a step-by-step migration guide for [OpenClaw → Hermes Agent](/guides/migrate-openclaw-to-hermes). Most of the same steps apply for the other targets, with notes on where they differ.