OpenClaw isn't fooling me. I remember MS-DOS
Perceived Value and Real‑World Use Cases
- Many commenters see OpenClaw/agent setups as mostly hobbyist toys or hype; some tried them, found them janky or without a compelling use case, and turned them off.
- Others report concrete value:
- Coding “interns” that implement plans, manage branches, or work on a separate workstation/VPS.
- Infrastructure agents that watch flaky dev servers and auto‑fix issues while logging “learnings.”
- Marketing/social agents that draft posts and graphics, or monitor support queues and nag humans.
- Personal assistants that monitor email (read‑only), calendars, gym schedules, bands’ tour dates, etc.
- Smart‑home control, media downloading, and light IT maintenance.
- Several people compare this to early home computers or 3D printers: currently more about tinkering/learning than net time savings.
Cost, Access, and ROI
- A recurring flashpoint is cost: some users spend around $180/month in API credits; critics call that absurd for “playing music and downloading movies.”
- Comparisons are drawn to live‑in au pairs or cheaper VAs, highlighting how out‑of‑reach this is for “ordinary people.”
- Others argue costs can be cut with cheaper models, local inference, or by using agents sparingly (e.g., Hermes tasks at ~$0.25 each).
- Long‑term GPU economics vs API use are debated; consensus leans toward APIs being cheaper and better for individuals while proprietary models advance rapidly.
Security, Privacy, and Safety Concerns
- Core concern: agents combining private data, untrusted content, and external actions (email, GitHub, payments) are a “ticking bomb.”
- Fear of prompt injection, credential exfiltration, destructive actions (deleting mail, nuking repos) and broad blast radius.
- Many insist they will not give agents payment credentials or high‑risk powers; others cautiously do so with strong limits (read‑only access, manual approvals, separate machines/VPSs, prepaid keys).
Architecture & Sandboxing Debate
- Strong criticism of “sandbox the whole agent” approaches; argued to be MS‑DOS‑like: one big box, no real isolation.
- Advocated alternatives:
- Tool‑level permissions and whitelisted arguments.
- Per‑channel process isolation, encrypted credential vaults, typed secrets, and auditable logs.
- Secret proxies outside the sandbox (HTTP proxies that inject tokens).
- Workflow engines where each new “task” is deployed as a minimal‑privilege app.
- Memory and autonomy are seen as unsolved: naive “heartbeat cron + huge context + RAG” is described as expensive, brittle, and eventually collapsing under its own weight.
Broader Reflections and Historical Analogies
- Comparisons to MS‑DOS, Windows 98, IoT home automation, and “worse is better”: crude, insecure tools that nonetheless may win by being first and convenient.
- Some think OpenClaw‑style assistants are inevitable and will be hardened over time; others see them as a niche for enthusiasts and enterprise “digital glue,” not a mass‑market revolution.