Recommended Working Directory
Siclaw stores most runtime data in a.siclaw/ folder relative to the directory where you start it. Create a dedicated working directory and reuse it:
Install
Local Server (recommended)
http://localhost:3000.
On first launch, open the Web UI and register the first user — that account becomes the admin. Subsequent registrations require admin authentication.
CLI (TUI)
Pairing with a local server
Ifsiclaw local is already running in the same working directory, the TUI detects it automatically and uses the Portal Web UI as the single source of truth for skills, knowledge, credentials, agents, MCP servers, and LLM providers. In that mode the TUI is strictly an observer:
/ls [skills|knowledge|mcp|credentials|agents]— inspect what the current session sees/agent— show the active Portal agent and all available ones; create / edit happens in the Web UI/setup— read-only view with “Open in Portal →” links (standalone mode still writes locally)
--agent <name> to scope the session to one Portal-configured agent:
siclaw local is running in the cwd and you start siclaw for the first time (no settings.json yet), the setup wizard prints Portal Web UI instructions, offers to open http://localhost:3000/settings/models in your browser, and exits — provider setup belongs in Portal, not in a per-workstation settings.json.
From Source
Configuration
By default, Siclaw reads and writes these paths relative to your current working directory:LLM Configuration
Standalone TUI (no local Portal running in the cwd) reads.siclaw/config/settings.json. The easiest path is to let the first-run wizard create it for you. If a siclaw local server is running in the same cwd, the wizard redirects to Portal Web UI instead (see Pairing with a local server) — provider setup for Portal-paired TUI happens in the Web UI’s Models page and applies to every TUI that pairs with that Portal.
Minimal example:
/setup to manage providers, models, and credentials.
In Local Server mode, configure providers and models in the Models page of the Web UI.
See LLM Providers for provider examples.
Kubernetes Credentials
Siclaw tools resolve kubeconfig from its own credential store, not from your shell’sKUBECONFIG.
- In TUI mode, use
/setupto import a kubeconfig - In Local Server mode, add it in Credentials
kubectl calls through that stored credential.
Embedding (Optional)
To enable Investigation Memory with semantic search, add an embedding config:embedding.apiKey is omitted, Siclaw falls back to the default LLM provider key.