OpenClaw Starter Packs
All articles

guides

Why Your OpenClaw Agent Needs Its Own Accounts

Your agent should never log in as you. Here's how to set up separate email, phone, passwords, and cloud storage for your OpenClaw agent, and why the 'new employee' model actually works.

OpenClaw Starter Packs March 12, 2026 Updated March 12, 2026

A lot of people set up OpenClaw by handing it their existing Gmail login. It is fast. You skip the account creation tedium and get straight to the interesting part. Then a week later the agent sends an email from your personal address to your boss with a subject line that made sense to the model and no one else, and you spend the rest of the day on damage control.

OpenClaw separate accounts are the fix. Give the agent its own email, its own phone number, its own password vault, its own browser profile. Claire Vo, founder of ChatPRD and former CTO, describes this as treating the agent like a new hire: separate identity, limited access, explicit sharing. She set up her agent Polly this way from day one, and it is the approach I recommend.

Prices and plan details in this article are current as of March 2026.

Why does ai agent account isolation matter?

Agents make predictable mistakes: wrong recipient, wrong tool, wrong interpretation of a vague instruction. The question is not whether this will happen. It is whether the mistake stays contained or bleeds into your personal life.

If your agent sends a garbled email from its own address, nobody recognizes the sender and nothing happens. If it sends the same email from your personal Gmail, your reputation takes the hit. If it accidentally triggers a password reset on a service, you want that reset to go to the agent’s phone number, not yours.

This is the same logic behind limiting access for any new person at a company. You scope their permissions, give them their own credentials, and expand access as trust builds. Your agent does not accumulate judgment over time the way a person does, so those boundaries need to stay in place permanently.

What accounts does your OpenClaw agent need?

Five things, roughly in order of importance: a dedicated email address, a phone number, a password vault, a browser profile, and separate cloud storage.

  1. A new email address that belongs only to the agent
  2. A phone number for verification codes and two-factor auth
  3. A dedicated vault or folder inside your password manager
  4. A browser profile with no saved personal credentials
  5. Separate cloud storage (Google Drive or Dropbox) for agent files

Email is the most important because nearly every online service uses it as the primary identity. Controlling what email address your agent uses controls what it can sign up for and access.

How should you set up openclaw email for your agent?

Use a separate email account for the agent. For most people the choice is a free Gmail inbox or a dedicated Google Workspace user.

The free route: create a new Gmail account. Something like yourname-agent@gmail.com or polly-assistant@gmail.com. Takes five minutes. The downside is that you have no centralized admin panel, so revoking access means logging into that Gmail and changing the password manually.

The better route: add your agent as a user in Google Workspace. This is what Claire Vo did with Polly. Vo set up Polly as a separate Workspace user instead of giving Polly access to her own accounts. Polly has her own email address, shared calendar access (read-only for some calendars, write access for others) and document access only when Vo explicitly shares something.

“Instead of giving an EA the keys to my castle, I said, you have your own workspace account,” Vo explained at an OpenClaw Camp session.

Google Workspace costs $7.20 per month per user on the Business Starter plan. For that you get centralized admin, the ability to revoke access instantly, audit logs of what the account did, and granular sharing controls on calendars and documents. If you are running OpenClaw for anything beyond casual experimentation, this is worth the cost.

The core principle: your agent should never send mail from your personal address. If it does, you cannot filter, audit, or revoke its email activity without affecting your own.

Should your agent have its own chat accounts?

Yes, if the agent will operate in Telegram, WhatsApp, Slack, Discord, or any other chat system, it should have its own identity there too.

This is the part people forget. They set up a separate email and maybe a separate browser profile, then let the agent post from their own Slack account or personal WhatsApp number. That defeats the whole point of ai agent account isolation.

A safer pattern looks like this:

  • Telegram: separate bot or dedicated account used only for agent interactions
  • WhatsApp: separate number, ideally not your primary number
  • Slack: separate workspace user with scoped channel access
  • Discord: separate bot or limited member account with explicit server permissions

The rule is simple: if a message could confuse people about whether it came from you or the agent, give the agent its own sender identity.

How do you handle phone numbers for your agent?

Google Voice gives you a free US phone number that can receive SMS verification codes. Set it up in about ten minutes. Forward texts to your agent’s email if you want a single place to monitor them.

A dedicated number matters because a surprising number of services require phone verification during signup. Without one, your agent either cannot register for things, or it uses your personal number. That means verification codes and password resets start arriving on your phone mixed in with your personal messages. I found this out the hard way when a two-factor code for a service I had forgotten about showed up on my phone at midnight.

One caveat worth knowing early: some services, notably banks and some enterprise tools, reject VoIP numbers for verification. Google Voice is VoIP, so you may hit this. If you do, a prepaid SIM from Mint Mobile costs about $15 per month and gives you a real mobile number that works everywhere.

How should you manage your agent’s passwords?

Keep agent credentials in a completely separate container from your personal passwords. Not a subfolder. A separate vault or service account.

Brandon Gell, Every’s COO, moved from LastPass to 1Password specifically for this reason. 1Password supports service accounts, which are dedicated logins that can only access specific password folders. Gell only adds passwords to the folder his agent Zosia can reach. She never has access to credentials he does not explicitly share.

In 1Password, the setup looks like this:

  1. Create a new vault called something like “Agent Access”
  2. Create a service account with access only to that vault
  3. Add only the credentials your agent needs to that vault
  4. Use the service account token in your OpenClaw configuration

1Password charges $4.99 per month for the individual plan that supports this. Bitwarden also supports separate collections, starting at $10 per year for personal use, though the service account feature requires the Teams plan at $4 per user per month.

Which password manager you pick matters less than the separation itself. Agent credentials and personal credentials need to live in different containers where the agent cannot see yours.

What about a browser profile?

A clean browser profile prevents your agent from accidentally using your logged-in sessions. Create one in Chrome or Firefox with no saved passwords, no bookmarks, no extensions logged into your accounts, no autofill data.

When OpenClaw opens a browser to check a website or fill out a form, it should be using this clean profile. Not the one where you are logged into your bank, your email, and whatever else you keep open.

In Chrome, go to Settings, then “Add” under the profile section. Name it something obvious like “OpenClaw Agent.” Takes about thirty seconds.

This is one of the easiest isolation steps and one of the most commonly skipped. If your agent is currently browsing with your main profile, it has access to every active session in that profile. That includes anything you are logged into. Fix this now; it is a thirty-second change.

Should your agent have its own cloud storage?

Separate cloud storage is useful when the agent reads or writes files you share with other people. Create a separate Google Drive or Dropbox account for the agent. Share specific folders from your main account to the agent’s account when needed, rather than giving the agent access to your entire drive.

This matters less than email or password isolation. If your agent writes a bad file to its own drive, nobody cares. If it writes a bad file to your shared work drive, your colleagues see it. So the question is really about how much your agent interacts with shared documents.

For most personal setups, a free Google Drive account (15GB) is more than enough. Your agent is mostly working with text files, configuration data, and small documents.

How far should you take account separation?

For most OpenClaw setups, the five layers above are enough: email, phone, passwords, browser, and storage. Separate finance or social accounts only when the agent acts publicly or handles money.

Nat Eliason went further than most. His agent Felix has its own X (Twitter) account, its own Stripe account, and its own bank account. Felix manages what Eliason described as “a concerning amount of money” in crypto. That level of separation makes sense when you are building an agent with a public identity and financial autonomy.

I would draw the line with a simple test: if the agent did the worst possible thing with a given account, could you recover in under an hour? If yes, the current isolation is fine. If the answer makes you uncomfortable, add another layer.

What are the common mistakes with openclaw separate accounts?

Five setup mistakes cause most account isolation failures.

Starting with your personal accounts and planning to “migrate later.” In my experience, the migration never happens. You get used to the convenience. Set up separate accounts from the beginning, even if it feels tedious. This sounds annoying to set up, and honestly it is a little annoying, but it is much less annoying than untangling a personal account after your agent has been using it for three months.

Using a shared password vault with a subfolder instead of a separate vault or service account. Subfolders are an organizational tool, not a security boundary. If the agent can see the vault, it can see everything in it.

Forgetting to set up a dedicated browser profile. This is the mistake I hear about most because the agent quietly browses using your logged-in sessions and you never notice until it does something unexpected with one of those sessions.

Giving the agent direct access to your personal calendar instead of sharing specific calendars to the agent’s account. Vo got this right: read-only access to some calendars, write access to others. Not full access to your primary calendar.

Skipping phone number isolation because it seems minor. It stops seeming minor when your agent triggers a password reset on a personal account and the verification code goes to your number.

What are the account hygiene rules worth memorizing?

A short checklist is easier to remember than a long lecture. These are the rules I would actually tape to the monitor:

  • never log the agent into your personal primary accounts
  • separate browser profile means separate, not “mostly separate”
  • share files and calendars explicitly, do not expose entire drives or primary calendars
  • keep agent passwords in a separate vault or service account
  • use names that make scope obvious, like agent-ops@ or polly-assistant@
  • set recovery options you can revoke without touching your personal identity
  • if an account would be painful to delete, the agent probably should not own it

That last one matters. The healthiest agent accounts are a little disposable. Not throwaway in the sloppy sense, but recoverable. Replaceable. Easy to shut down without dragging your real life down with them.

What does a complete setup look like?

A complete isolated setup costs about $12 per month and takes about 40 minutes to configure.

Account typeServiceCostSetup time
EmailGoogle Workspace user$7.20/month10 minutes
PhoneGoogle VoiceFree10 minutes
Passwords1Password service account$4.99/month15 minutes
BrowserChrome profileFree1 minute
Cloud storageGoogle Drive (free tier)Free5 minutes

You can do the free version of everything (Gmail instead of Workspace, Bitwarden instead of 1Password) and pay nothing. The setup time is roughly the same. What you lose is centralized admin controls and audit logging, which matter more as your agent takes on more responsibility.

What is the handoff protocol when a human takes over?

The handoff protocol is how you let the agent act on your behalf without leaving permanent access lying around afterward.

Use this sequence:

  1. Pause the agent before the sensitive task starts.
  2. Grant the narrowest access that solves the task, like one shared folder, one calendar, or one temporary credential.
  3. Let the agent do the work through its own accounts, not yours.
  4. Review what it sent, changed, or downloaded.
  5. Revoke the temporary access when the task is done.
  6. Keep a short note of what was granted and when it was removed.

This sounds fussy until the first time you need to unwind access quickly. Then it feels like the only sane way to operate.

After account setup, grant access one permission at a time through the agent’s accounts, not your personal ones. The agent reads email through its own inbox. It browses the web through its own profile. It stores credentials in its own vault.

If you set up accounts this way from the start, expanding permissions later is straightforward. You share a calendar to the agent’s Workspace user. You add a password to the agent’s vault. You grant access to a specific Drive folder. Each change is explicit and reversible.

If you started with your personal accounts instead, every expansion is a risk you cannot easily walk back. The boundaries between agent activity and personal activity get blurry fast, and blurry boundaries are where agent mistakes turn into real problems.