NemoClaw guide
NemoClaw Permission Planner
Permission planning is where safer agent design becomes concrete. The NemoClaw Permission Planner is about deciding what an agent can do before you decide how convenient you want the experience to feel. That is the difference between a controlled workflow and an over-permissioned one.
Start with task boundaries, not full capability
Least-privilege planning works best when you begin with the narrowest useful task boundary. A research agent that summarizes documentation might need limited browsing but no write access. A code review assistant might need repository read access and local model routing, but not shell execution. By anchoring permissions to a single job, you reduce the temptation to give every agent a general-purpose profile just because it might be useful later.
This is especially important in NemoClaw environments where multiple agents may be introduced over time. If each workflow inherits the broadest profile in the system, operational risk compounds quickly. A planner helps you define stable defaults for network, files, and approvals, then create exceptions only when there is a specific, documented reason.
The four permission surfaces that matter most
Most permission decisions come down to four surfaces: outbound network access, local or project file access, model routing destinations, and whether high-risk actions require approval. These surfaces are often entangled. A browser-enabled workflow with cloud-only routing may expose different prompt-injection and data-handling concerns than a local-only workflow that never leaves the machine. File write access is usually manageable when it is scoped, logged, and gated, but becomes significantly riskier when paired with no approval requirement.
A planner should not just list those surfaces. It should explain how they interact and what guardrails belong with each combination. That includes allowlists for browsing, directory scoping for file work, routing rules for sensitive data, and human review points before mutation, execution, or upload actions happen.
From permission plan to operating standard
Once you have a plan, the next step is consistency. A single safe configuration is valuable, but a repeatable permission standard is what prevents drift. That means documenting which agent classes are allowed to browse, which can modify files, which can call external models, and when manual approval is mandatory. The planner gives you the language to do that before you formalize anything in code or policy.
This is also where structured recommendations are useful. A permission summary can be turned into an engineering checklist, an onboarding doc for new workflows, or a review rubric for future agent requests. The goal is not just to answer one setup question but to establish a way of making permission decisions across many agents without having to restart the conversation every time.
Where to go next
If you already know the access pattern you want and need a quick draft configuration, return to the homepage generator. If you want concrete examples of how different agent classes should be shaped, the Workflow Examples page gives more operational patterns. Teams worried about writing agents into repositories should also read Coding Agent Permissions, while teams enabling browsing workflows should continue into Browser Agent Security.
These internal links matter for users and for SEO because they reflect distinct intents. Some visitors are looking for a tool. Others are looking for guidance on one layer of access design. Connecting those intents produces a site that feels more authoritative and keeps users moving deeper into the relevant material instead of bouncing after one page.