AI Navigate

[Project] I bypassed NemoClaw's sandbox isolation to run a fully local agent (Nemotron 9B + tool calling) on a single RTX 5090

Reddit r/LocalLLaMA / 3/18/2026

📰 NewsDeveloper Stack & InfrastructureTools & Practical UsageModels & Research

Key Points

  • NVIDIA launched NemoClaw at GTC as an enterprise sandbox for AI agents built on OpenShell, which by default expects cloud API connections and heavily restricts local networking.
  • The author achieved 100% local inference on WSL2 with RTX 5090 by bypassing the sandbox using host iptables rules, a Pod TCP Relay bridging the sandbox veth to the Docker bridge, and nsenter-injected ACCEPT rules to bypass the sandbox's OUTPUT chain.
  • They built a custom gateway that intercepts the streaming SSE response from vLLM, buffers and parses the <TOOLCALL> tags, and rewrites them into OpenAI-compatible tool_calls in real time.
  • Everything runs locally with no data leaving the machine, but it is volatile since WSL2 reboots wipe the iptables hacks.
  • A GitHub repository is planned, and the author asks whether others have attempted running NemoClaw locally.

NVIDIA launched NemoClaw at GTC yesterday — an enterprise sandbox for AI agents built on OpenShell (k3s + Landlock + seccomp). By default it expects cloud API connections and heavily restricts local networking.

I wanted 100% local inference on WSL2 + RTX 5090, so I punched through the sandbox to reach my vLLM instance.

  • Host iptables: allowed traffic from Docker bridge to vLLM (port 8000)
  • Pod TCP Relay: custom Python relay in the Pod's main namespace bridging sandbox veth → Docker bridge
  • Sandbox iptables injection: nsenter to inject ACCEPT rule into the sandbox's OUTPUT chain, bypassing the default REJECT

Tool Call Translation: Nemotron 9B outputs tool calls as <TOOLCALL>[...]</TOOLCALL> text. Built a custom Gateway that intercepts the streaming SSE response from vLLM, buffers it, parses the tags, and rewrites them into OpenAI-compatible tool_calls in real-time. This lets opencode inside the sandbox use Nemotron as a fully autonomous agent.

Everything runs locally — no data leaves the machine. It's volatile (WSL2 reboots wipe the iptables hacks), but seeing a 9B model execute terminal commands inside a locked-down enterprise container is satisfying.

GitHub repo coming once I clean it up. Anyone else tried running NemoClaw locally?

submitted by /u/Impressive_Tower_550
[link] [comments]