Launch OpenClawas a product.

Lodestone by Pickaxe gives OpenClaw the product layer: customer access, sandbox persistence, rollout control, metering, and scoped auth.

Sandbox lifecycle
Version management
User metering
Secrets + auth

01

One sandbox lifecycle

Spin up fast, persist installs, and keep recurring jobs alive even when compute recycles.

02

One rollout path

Version creator changes, preserve user state, and apply updates into sandboxes without clobbering local work.

03

One control layer

Meter users, enforce cutoffs, and broker secrets plus auth in the same operational system.

Why this is hard

The bot is not the problem. Everything around the bot is.

A single OpenClaw demo is easy to love. A customer-facing OpenClaw deployment platform is where the infrastructure work shows up: sandbox lifecycle, persisted installs, user-owned file state, version rollout, model-cost attribution, spend cutoffs, and secret plus auth flows that have nothing to do with the prompt itself.

Lifecycle control

Fast sandbox spinup with the right user context attached.

Lodestone spins up the right sandbox for each user with the right packages, workspace, and scheduled work already connected, so launches stay fast and setup stays minimal.

Fast launch into the correct user sandbox
User context mapped at spinup
Packages and jobs attached to the right environment
Less setup and routing work per deployment
lodestone-cli
tty attachedlaunching
%luna@pickaxe

Controlled rollout

Ship updates without disrupting user sandbox state.

Keep each user sandbox current while preserving the files and local state inside it. Lodestone gives your team a clear release path for updates, so improvements roll out cleanly without overwriting user work.

User files stay with each sandbox
Updates move through a clear release path
Controlled rollout into target sandboxes
Rollback-ready releases when needed
Version promotion

creator change

prompt.md + parser.ts

draft saved

snapshot

release/v14

snapshotted v14

apply

target sandboxes

idle

User sandboxes

luna/sbx-24local edits only
chris/sbx-19pinned to v13
luna/sbx-07idle

Usage controls

Make usage visible and sandbox access scoped.

Lodestone ties model usage, spend limits and runtime credentials to the right user sandbox so teams can show what was used, control costs as they happen and give each OpenClaw instance only the access it needs.

Per-user usage tracked across model providers
Visible costs and metrics for customers and operators
Warnings, limits and cutoffs when needed
Secrets created, matched and revoked per sandbox
Metering + cutoff
gpt-4.1 62%claude 28%other 10%
org/acme-finance$108.20
user/luna$32.50
user/chris$27.90
threshold$125 hard cap
soft cap sentnotify operators

Runtime access

Launch with real Macs and home-network IPs.

Lodestone makes Mac runtime and home-network access part of the product, so teams can support harder workflows without building a separate stack.

Mac runtime on demand
Home-network IPs available when needed
Cleaner setup for machine and network access
One platform for launch and control
Mac + IP access

Lodestone broker

mac mini

OpenClaw runtime

mac hostmatched
home IPassigned
sessionpending
real machome-network ipsession ready
Products

Power the full customer-facing OpenClaw product.

Platform

Build on a customer-ready foundation.

The bot is only part of the job. Once customers are involved, you need separation, usage controls, runtime access, and rollout paths that keep the product usable without turning every launch into custom infrastructure work.

Mountain nightscape artwork for tenant boundaries

Customer separation

Keep each customer's usage, data, and access rules cleanly separated across environments.

Sci-fi ridge artwork for product runtime

Product runtime

Give users a real product surface with the right sandbox, context, and controls already in place.

Celestial cloud artwork for runtime access

Runtime access

Bring Mac runtime and home-network access into the same platform when a workflow needs more than standard compute.

Futuristic platform artwork for repeatable launches

Repeatable launches

Turn one working launch path into a repeatable system your team can use again and again.

FAQ

Frequently asked questions

These questions cover the customer-facing system around OpenClaw: access, rollout, spend, secrets, and the Lodestone layer required to deploy it cleanly.

Because a bot demo and a customer product are different jobs. Once real users show up, you need access control, customer separation, secret handling, usage limits, rollout control, and a product surface people can actually log into and trust. OpenClaw can power the bot. Lodestone is the layer that makes it customer-deployable.

Bring your OpenClaw. We will talk through how Lodestone wraps the layer around it.

If your team already has OpenClaw logic working, the next conversation should be about sandbox persistence, version rollout, per-user metering, spend cutoffs, scoped secret injection, and what it takes to support real customers without turning the infra layer into a second company.

Sandbox persistence
Version rollout
Metering + cutoff
Secrets + auth

Infra review request

Tell us about the deployment.

Open the intake form to share your deployment context, current blockers, and what kind of conversation would be useful.