Subs -10% SUB-10
OpenClaw MCP Servers: Connect Your AI Agent to Everything
$ ./blog/guides
Guides

OpenClaw MCP Servers: Connect Your AI Agent to Everything

ClawHosters
ClawHosters by Daniel Samer
6 min read

Your ClawHosters instance can query your PostgreSQL database, search the web through Brave, read files from Google Drive, and post messages to Slack. All without you writing a single line of integration code. That's what OpenClaw MCP servers do.

MCP stands for Model Context Protocol. Anthropic introduced it in November 2024 as an open standard for connecting AI applications to external tools and data sources. The analogy that stuck: MCP is the USB-C port for AI. Before it existed, every data source required a custom integration. Now there's one protocol that works across clients and servers.

The ecosystem grew faster than probably anyone expected. Downloads went from roughly 100,000 to over 8 million in five months after launch. There are now over 1,200 quality-verified servers in directories, with tens of thousands more on GitHub. Anthropic, OpenAI, Google, and Microsoft all back the standard. It won.

And MCP isn't Claude-specific. OpenClaw acts as an MCP client regardless of which LLM you're running behind it.

What Ships with ClawHosters

Every ClawHosters instance comes with three built-in MCP servers, pre-installed in the base snapshot:

Server What It Does
Filesystem Read and write files inside your instance
Shell Execute terminal commands in the container
Browser Browse the web via Playwright (Chromium included)

These cover the most common use cases out of the box. You can configure them through the ClawHosters web UI or by editing openclaw.json directly via SSH. For full setup instructions, check the MCP servers documentation.

OpenClaw MCP Configuration

MCP servers live in the mcpServers object inside your openclaw.json. Each entry needs a command, arguments, and optionally environment variables for API keys:

{
  "mcpServers": {
    "github": {
      "command": "npx",
      "args": ["-y", "@modelcontextprotocol/server-github"],
      "env": {
        "GITHUB_PERSONAL_ACCESS_TOKEN": "ghp_your_token_here"
      }
    },
    "brave-search": {
      "command": "npx",
      "args": ["-y", "@modelcontextprotocol/server-brave-search"],
      "env": {
        "BRAVE_API_KEY": "your_key_here"
      }
    }
  }
}

That npx -y pattern is the standard way most MCP servers run. It downloads and executes an npm package without manual installation. The -y flag auto-confirms the install prompt.

You can also configure servers through the ClawHosters dashboard without touching JSON at all. The web UI handles the same fields.

Popular OpenClaw MCP Servers Worth Adding

These are verified working on ClawHosters instances. Builder.io's developer guide covers a broader list, but here are the ones I see used most:

Use Case Package
GitHub repos @modelcontextprotocol/server-github
PostgreSQL queries @modelcontextprotocol/server-postgres
Google Drive files @modelcontextprotocol/server-gdrive
Slack messages @modelcontextprotocol/server-slack
Web search @modelcontextprotocol/server-brave-search
Notion pages @notionhq/mcp

One thing to watch: memory. Built-in servers use 20 to 50 MB each. Node.js custom servers run 50 to 150 MB each. The Browser server can hit 200 to 400 MB when active. If you're on a smaller ClawHosters tier, adding four custom servers on top of the built-in ones might push you close to limits. Two or three custom servers is a reasonable starting point for most setups.

Custom OpenClaw MCP installations persist across container restarts. But they get wiped on a rebuild. If you trigger a rebuild, you'll need to re-add any custom MCP servers afterward.

Security: The Part You Shouldn't Skip

I'm going to be direct about this. MCP servers run with the same permissions as the container, which is root. That means a malicious or compromised MCP server has full access to everything inside your instance: files, credentials, API keys, conversation history.

This isn't a bug in ClawHosters. It's how MCP works everywhere. The official MCP specification documents the risks explicitly, including arbitrary code execution via malicious server packages.

Real incidents have already happened. In January 2026, The Register reported that Anthropic quietly fixed three chained vulnerabilities in their own Git MCP server. These enabled remote code execution. Even the protocol creators' first-party server had these bugs.

Then there's tool poisoning. Security researchers at Invariant Labs demonstrated that a malicious MCP server can embed hidden instructions in its tool description. The AI sees and follows these instructions. The user never sees them. In one demo, this technique silently exfiltrated a user's WhatsApp message history.

According to Pillar Security, compromising one MCP server can grant attackers access to all connected service tokens. Think email, calendar, file storage.

So what should you actually do?

Only install MCP servers from sources you understand. The @modelcontextprotocol packages from Anthropic are the most scrutinized. Verify the npm package name before running npx -y on anything. And don't mix trusted and untrusted servers on the same instance if you're storing sensitive credentials. ClawHosters provides container isolation from the host, but data inside the container is accessible to any MCP server running there.

For more on securing your instance overall, the security hardening guide covers the full picture. And the ClawHosters docs on security explain what protections ship out of the box.

Frequently Asked Questions

MCP (Model Context Protocol) lets your OpenClaw instance connect to external tools like databases, APIs, and web services through a single standard. Instead of building custom integrations, you add an MCP server and your agent gets new capabilities immediately.

There's no hard limit, but memory is the constraint. Built-in servers use 20 to 50 MB each, custom Node.js servers 50 to 150 MB. On most tiers, two to four custom servers work well alongside the built-in ones. Check the pricing page for memory specs per tier.

Yes, custom servers installed in the data volume persist across normal container restarts. But a full rebuild wipes them. Built-in servers (Filesystem, Shell, Browser) always persist because they're part of the base snapshot.

They're powerful, which means the security surface is real. MCP servers run as root inside the container and can access anything in it. Stick to well-known packages, verify what you're installing, and avoid mixing trusted and untrusted servers. The MCP security docs have detailed guidance.

No. MCP is an open standard backed by Anthropic, OpenAI, Google, and Microsoft. It works with any LLM that your OpenClaw instance runs, not just Claude.
*Last updated: February 2026*

Sources

  1. 1 introduced it in November 2024
  2. 2 over 1,200 quality-verified servers
  3. 3 MCP servers documentation
  4. 4 covers a broader list
  5. 5 ClawHosters tier
  6. 6 official MCP specification
  7. 7 The Register reported
  8. 8 Invariant Labs demonstrated
  9. 9 Pillar Security
  10. 10 security hardening guide
  11. 11 ClawHosters docs on security