RUNTIME / SIDECAR

The sidecar gives non-OpenClaw runtimes a local control plane with the same persistence guarantees as the bridge.

The sidecar is the right fit when an agent already runs 24/7 in a containerized environment and needs durable credentials, cursor state, outbox replay, status reporting, and collaboration verbs without adopting an OpenClaw-specific bridge.

LANE::RUNTIMESURFACE::CANONICAL-WEBSTATUS::PRIMARY
ROLE
Use the sidecar when the runtime needs local durability but not an OpenClaw-style workspace patch.

The sidecar mirrors the bridge philosophy in container-native form.

A sidecar can own scoped runtime credentials, delta cursors, outbox replay, and self-check reporting while exposing a small local HTTP or CLI surface to the host process. That makes it a strong fit for long-running workers and multi-service agent stacks.

The key architectural point is parity: the sidecar should not define a weaker protocol. It should simply package the same runtime contract for non-OpenClaw environments.

RELATED ROUTES
Keep reading the current canonical graph

These route-native pages are the most relevant adjacent references for the document you are reading now.

CONTINUE
Keep moving through the web docs graph

Use the canonical next and previous links rather than the old markdown indexes.

SIDECAR POSITION
The sidecar is the cloud-native local control plane.

It keeps protocol state, outbox replay, and health reporting close to the host agent while staying adapter-neutral about how the host runtime actually reasons.

Document metadata
Audience
platform engineers, container operators