Run Moltbot personal AI assistant in a Cloudflare Sandbox.
Experimental: This is a proof of concept demonstrating that Moltbot can run in Cloudflare Sandbox. It is not officially supported and may break without notice. Use at your own risk.
- Workers Paid plan ($5 USD/month) — required for Cloudflare Sandbox containers
- Anthropic API key — for Claude access, or you can use AI Gateway's Unified Billing
The following Cloudflare features used by this project have free tiers:
- Cloudflare Access (authentication)
- Browser Rendering (for browser navigation)
- AI Gateway (optional, for API routing/analytics)
- R2 Storage (optional, for persistence)
Moltbot is a personal AI assistant with a gateway architecture that connects to multiple chat platforms. Key features:
- Control UI - Web-based chat interface at the gateway
- Multi-channel support - Telegram, Discord, Slack
- Device pairing - Secure DM authentication requiring explicit approval
- Persistent conversations - Chat history and context across sessions
- Agent runtime - Extensible AI capabilities with workspace and skills
This project packages Moltbot to run in a Cloudflare Sandbox container, providing a fully managed, always-on deployment without needing to self-host. Optional R2 storage enables persistence across container restarts.
Cloudflare Sandboxes are available on the Workers Paid plan.
# Install dependencies
npm install
# Set your API key (direct Anthropic access)
npx wrangler secret put ANTHROPIC_API_KEY
# Or use AI Gateway instead (see "Optional: Cloudflare AI Gateway" below)
# npx wrangler secret put AI_GATEWAY_API_KEY
# npx wrangler secret put AI_GATEWAY_BASE_URL
# Generate and set a gateway token (required for remote access)
# Save this token - you'll need it to access the Control UI
export MOLTBOT_GATEWAY_TOKEN=$(openssl rand -base64 32 | tr -d '=+/' | head -c 32)
echo "Your gateway token: $MOLTBOT_GATEWAY_TOKEN"
echo "$MOLTBOT_GATEWAY_TOKEN" | npx wrangler secret put MOLTBOT_GATEWAY_TOKEN
# Deploy
npm run deployAfter deploying, open the Control UI with your token:
https://your-worker.workers.dev/?token=YOUR_GATEWAY_TOKEN
Replace your-worker with your actual worker subdomain and YOUR_GATEWAY_TOKEN with the token you generated above.
Note: The first request may take 1-2 minutes while the container starts.
Important: You will not be able to use the Control UI until you complete the following steps. You MUST:
- Set up Cloudflare Access to protect the admin UI
- Pair your device via the admin UI at
/_admin/
You'll also likely want to enable R2 storage so your paired devices and conversation history persist across container restarts (optional but recommended).
To use the admin UI at /_admin/ for device management, you need to:
- Enable Cloudflare Access on your worker
- Set the Access secrets so the worker can validate JWTs
The easiest way to protect your worker is using the built-in Cloudflare Access integration for workers.dev:
- Go to the Workers & Pages dashboard
- Select your Worker (e.g.,
moltbot-sandbox) - In Settings, under Domains & Routes, in the
workers.devrow, click the meatballs menu (...) - Click Enable Cloudflare Access
- Click Manage Cloudflare Access to configure who can access:
- Add your email address to the allow list
- Or configure other identity providers (Google, GitHub, etc.)
- Copy the Application Audience (AUD) tag from the Access application settings. This will be your
CF_ACCESS_AUDin Step 2 below
After enabling Cloudflare Access, set the secrets so the worker can validate JWTs:
# Your Cloudflare Access team domain (e.g., "myteam.cloudflareaccess.com")
npx wrangler secret put CF_ACCESS_TEAM_DOMAIN
# The Application Audience (AUD) tag from your Access application that you copied in the step above
npx wrangler secret put CF_ACCESS_AUDYou can find your team domain in the Zero Trust Dashboard under Settings > Custom Pages (it's the subdomain before .cloudflareaccess.com).
npm run deployNow visit /_admin/ and you'll be prompted to authenticate via Cloudflare Access before accessing the admin UI.
If you prefer more control, you can manually create an Access application:
- Go to Cloudflare Zero Trust Dashboard
- Navigate to Access > Applications
- Create a new Self-hosted application
- Set the application domain to your Worker URL (e.g.,
moltbot-sandbox.your-subdomain.workers.dev) - Add paths to protect:
/_admin/*,/api/*,/debug/* - Configure your desired identity providers (e.g., email OTP, Google, GitHub)
- Copy the Application Audience (AUD) tag and set the secrets as shown above
For local development, create a .dev.vars file with:
DEV_MODE=true # Skip Cloudflare Access auth + bypass device pairing
DEBUG_ROUTES=true # Enable /debug/* routes (optional)By default, moltbot uses device pairing for authentication. When a new device (browser, CLI, etc.) connects, it must be approved via the admin UI at /_admin/.
- A device connects to the gateway
- The connection is held pending until approved
- An admin approves the device via
/_admin/ - The device is now paired and can connect freely
This is the most secure option as it requires explicit approval for each device.
A gateway token is required to access the Control UI when hosted remotely. Pass it as a query parameter:
https://your-worker.workers.dev/?token=YOUR_TOKEN
wss://your-worker.workers.dev/ws?token=YOUR_TOKEN
Note: Even with a valid token, new devices still require approval via the admin UI at /_admin/ (see Device Pairing above).
For local development only, set DEV_MODE=true in .dev.vars to skip Cloudflare Access authentication and enable allowInsecureAuth (bypasses device pairing entirely).
By default, moltbot data (configs, paired devices, conversation history) is lost when the container restarts. To enable persistent storage across sessions, configure R2:
- Go to R2 > Overview in the Cloudflare Dashboard
- Click Manage R2 API Tokens
- Create a new token with Object Read & Write permissions
- Select the
moltbot-databucket (created automatically on first deploy) - Copy the Access Key ID and Secret Access Key
# R2 Access Key ID
npx wrangler secret put R2_ACCESS_KEY_ID
# R2 Secret Access Key
npx wrangler secret put R2_SECRET_ACCESS_KEY
# Your Cloudflare Account ID
npx wrangler secret put CF_ACCOUNT_IDTo find your Account ID: Go to the Cloudflare Dashboard, click the three dots menu next to your account name, and select "Copy Account ID".
R2 storage uses a backup/restore approach for simplicity:
On container startup:
- If R2 is mounted and contains backup data, it's restored to the moltbot config directory
- Moltbot uses its default paths (no special configuration needed)
During operation:
- A cron job runs every 5 minutes to sync the moltbot config to R2
- You can also trigger a manual backup from the admin UI at
/_admin/
In the admin UI:
- When R2 is configured, you'll see "Last backup: [timestamp]"
- Click "Backup Now" to trigger an immediate sync
Without R2 credentials, moltbot still works but uses ephemeral storage (data lost on container restart).
By default, the sandbox container stays alive indefinitely (SANDBOX_SLEEP_AFTER=never). This is recommended because cold starts take 1-2 minutes.
To reduce costs for infrequently used deployments, you can configure the container to sleep after a period of inactivity:
npx wrangler secret put SANDBOX_SLEEP_AFTER
# Enter: 10m (or 1h, 30m, etc.)When the container sleeps, the next request will trigger a cold start. If you have R2 storage configured, your paired devices and data will persist across restarts.
Access the admin UI at /_admin/ to:
- R2 Storage Status - Shows if R2 is configured, last backup time, and a "Backup Now" button
- Restart Gateway - Kill and restart the moltbot gateway process
- Device Pairing - View pending requests, approve devices individually or all at once, view paired devices
The admin UI requires Cloudflare Access authentication (or DEV_MODE=true for local development).
Debug endpoints are available at /debug/* when enabled (requires DEBUG_ROUTES=true and Cloudflare Access):
GET /debug/processes- List all container processesGET /debug/logs?id=<process_id>- Get logs for a specific processGET /debug/version- Get container and moltbot version info
npx wrangler secret put TELEGRAM_BOT_TOKEN
npm run deploynpx wrangler secret put DISCORD_BOT_TOKEN
npm run deploynpx wrangler secret put SLACK_BOT_TOKEN
npx wrangler secret put SLACK_APP_TOKEN
npm run deployThis worker includes a Chrome DevTools Protocol (CDP) shim that enables browser automation capabilities. This allows Moltbot to control a headless browser for tasks like web scraping, screenshots, and automated testing.
- Set a shared secret for authentication:
npx wrangler secret put CDP_SECRET
# Enter a secure random string- Set your worker's public URL:
npx wrangler secret put WORKER_URL
# Enter: https://your-worker.workers.dev- Redeploy:
npm run deploy| Endpoint | Description |
|---|---|
GET /cdp/json/version |
Browser version information |
GET /cdp/json/list |
List available browser targets |
GET /cdp/json/new |
Create a new browser target |
WS /cdp/devtools/browser/{id} |
WebSocket connection for CDP commands |
All endpoints require the CDP_SECRET header for authentication.
The container includes pre-installed skills in /root/clawd/skills/:
Browser automation via the CDP shim. Requires CDP_SECRET and WORKER_URL to be set (see Browser Automation above).
Scripts:
screenshot.js- Capture a screenshot of a URLvideo.js- Create a video from multiple URLscdp-client.js- Reusable CDP client library
Usage:
# Screenshot
node /root/clawd/skills/cloudflare-browser/scripts/screenshot.js https://example.com output.png
# Video from multiple URLs
node /root/clawd/skills/cloudflare-browser/scripts/video.js "https://site1.com,https://site2.com" output.mp4 --scrollSee skills/cloudflare-browser/SKILL.md for full documentation.
You can route API requests through Cloudflare AI Gateway for caching, rate limiting, analytics, and cost tracking. AI Gateway supports multiple providers — configure your preferred provider in the gateway and use these env vars:
- Create an AI Gateway in the AI Gateway section of the Cloudflare Dashboard.
- Add a provider (e.g., Anthropic) to your gateway
- Set the gateway secrets:
You'll find the base URL on the Overview tab of your newly created gateway. At the bottom of the page, expand the Native API/SDK Examples section and select "Anthropic".
# Your provider's API key (e.g., Anthropic API key)
npx wrangler secret put AI_GATEWAY_API_KEY
# Your AI Gateway endpoint URL
npx wrangler secret put AI_GATEWAY_BASE_URL
# Enter: https://gateway.ai.cloudflare.com/v1/{account_id}/{gateway_id}/anthropic- Redeploy:
npm run deployThe AI_GATEWAY_* variables take precedence over ANTHROPIC_* if both are set.
| Secret | Required | Description |
|---|---|---|
AI_GATEWAY_API_KEY |
Yes* | API key for your AI Gateway provider (requires AI_GATEWAY_BASE_URL) |
AI_GATEWAY_BASE_URL |
Yes* | AI Gateway endpoint URL (required when using AI_GATEWAY_API_KEY) |
ANTHROPIC_API_KEY |
Yes* | Direct Anthropic API key (fallback if AI Gateway not configured) |
ANTHROPIC_BASE_URL |
No | Direct Anthropic API base URL (fallback) |
OPENAI_API_KEY |
No | OpenAI API key (alternative provider) |
CF_ACCESS_TEAM_DOMAIN |
Yes* | Cloudflare Access team domain (required for admin UI) |
CF_ACCESS_AUD |
Yes* | Cloudflare Access application audience (required for admin UI) |
MOLTBOT_GATEWAY_TOKEN |
Yes | Gateway token for authentication (pass via ?token= query param) |
DEV_MODE |
No | Set to true to skip CF Access auth + device pairing (local dev only) |
DEBUG_ROUTES |
No | Set to true to enable /debug/* routes |
SANDBOX_SLEEP_AFTER |
No | Container sleep timeout: never (default) or duration like 10m, 1h |
R2_ACCESS_KEY_ID |
No | R2 access key for persistent storage |
R2_SECRET_ACCESS_KEY |
No | R2 secret key for persistent storage |
CF_ACCOUNT_ID |
No | Cloudflare account ID (required for R2 storage) |
TELEGRAM_BOT_TOKEN |
No | Telegram bot token |
TELEGRAM_DM_POLICY |
No | Telegram DM policy: pairing (default) or open |
DISCORD_BOT_TOKEN |
No | Discord bot token |
DISCORD_DM_POLICY |
No | Discord DM policy: pairing (default) or open |
SLACK_BOT_TOKEN |
No | Slack bot token |
SLACK_APP_TOKEN |
No | Slack app token |
CDP_SECRET |
No | Shared secret for CDP endpoint authentication (see Browser Automation) |
WORKER_URL |
No | Public URL of the worker (required for CDP) |
Moltbot in Cloudflare Sandbox uses multiple authentication layers:
-
Cloudflare Access - Protects admin routes (
/_admin/,/api/*,/debug/*). Only authenticated users can manage devices. -
Gateway Token - Required to access the Control UI. Pass via
?token=query parameter. Keep this secret. -
Device Pairing - Each device (browser, CLI, chat platform DM) must be explicitly approved via the admin UI before it can interact with the assistant. This is the default "pairing" DM policy.
npm run dev fails with an Unauthorized error: You need to enable Cloudflare Containers in the Containers dashboard
Gateway fails to start: Check npx wrangler secret list and npx wrangler tail
Config changes not working: Edit the # Build cache bust: comment in Dockerfile and redeploy
Slow first request: Cold starts take 1-2 minutes. Subsequent requests are faster.
R2 not mounting: Check that all three R2 secrets are set (R2_ACCESS_KEY_ID, R2_SECRET_ACCESS_KEY, CF_ACCOUNT_ID). Note: R2 mounting only works in production, not with wrangler dev.
Access denied on admin routes: Ensure CF_ACCESS_TEAM_DOMAIN and CF_ACCESS_AUD are set, and that your Cloudflare Access application is configured correctly.
Devices not appearing in admin UI: Device list commands take 10-15 seconds due to WebSocket connection overhead. Wait and refresh.
WebSocket issues in local development: wrangler dev has known limitations with WebSocket proxying through the sandbox. HTTP requests work but WebSocket connections may fail. Deploy to Cloudflare for full functionality.


