open-forge
Health Pass
- License — License: MIT
- Description — Repository has a description
- Active repo — Last push 0 days ago
- Community trust — 24 GitHub stars
Code Pass
- Code scan — Scanned 12 files during light audit, no dangerous patterns found
Permissions Pass
- Permissions — No dangerous permissions requested
This agent acts as an automated deployment assistant, using AI to guide users through self-hosting over 950 open-source applications across various cloud providers. It provides "recipes" for these deployments and integrates directly into popular coding tools like Claude Code, Cursor, and Aider.
Security Assessment
Overall risk: Medium. As an infrastructure-focused agent, its primary function involves executing shell commands and making network requests to deploy applications on cloud environments. The automated nature of these actions inherently requires a higher level of system access. However, the automated code scan found no hardcoded secrets, and the tool does not request explicitly dangerous permissions. Additionally, the developers appear to have considered security boundaries, explicitly noting that credential pasting is disabled when running inside autonomous agent modes to protect sensitive data.
Quality Assessment
The project demonstrates positive health metrics and active maintenance, with its most recent code push occurring just today. It uses the highly permissive and standard MIT license, making it freely available for integration. While community trust is still in its early stages with a modest 24 GitHub stars, the light audit successfully scanned 12 files without detecting any dangerous code patterns, indicating a clean baseline quality.
Verdict
Safe to use. Developers can confidently integrate this tool, provided they remain aware of its high-level system access and monitor the automated cloud deployments.
AI-guided self-hosting for 950+ open-source apps on any cloud. Works with Claude Code, Codex, Cursor, Aider, OpenClaw, Hermes — catalog self-improves from user feedback.
open-forge
Self-host any open-source app on your own infrastructure — guided by Claude Code.
A self-improving recipe catalog that gets better every time anyone deploys.
> "Self-host OpenClaw on AWS Lightsail with Bedrock pre-wired."
[open-forge] Loading verified recipe openclaw.md (v0.20.1).
[open-forge] Combo: AWS Lightsail OpenClaw blueprint (vendor-bundled, Bedrock IAM included).
[open-forge] I'll need your AWS profile and the domain you want.
AWS profile name?
(OpenClaw — the self-hosted personal AI agent at openclaw.ai — is the project's signature use case; works the same way for any of the ~180 verified recipes.)
Install
In Claude Code:
/plugin marketplace add zhangqi444/open-forge
/plugin install open-forge@open-forge
Other AI coding tools and agent platforms — see docs/platforms/:
| Platform | How |
|---|---|
| Codex (ChatGPT / CLI) | System-prompt embedding or workspace files |
| Cursor | .cursor/rules/ bundle |
| Aider | --read files + CONVENTIONS.md |
| Continue.dev | Context provider + slash command |
| OpenClaw (personal AI agent at openclaw.ai) | Workspace skill at ~/.openclaw/workspace/skills/open-forge/ |
| Hermes-Agent (Nous Research) | User skill at ~/.hermes/skills/open-forge/ |
| Generic agents | Any LLM that can read files + run shell |
Agent-mode caveat: When running inside an autonomous agent (OpenClaw / Hermes / messaging-channel agents), credential paste is disabled — the skill only accepts file paths, env vars, cloud-CLI sessions, or secrets-manager refs. Pasting credentials into messaging channels (WhatsApp / Telegram / etc.) is meaningfully riskier than into coding-tool chat. Group-channel deploy conversations are also refused.
On Windows? See docs/windows-setup.md for WSL2 + Docker Desktop setup and common Windows gotchas (stale Git proxy, line endings, WSL integration).
Then say what you want to deploy:
"Set up OpenClaw on my Raspberry Pi with the local Ollama provider."
"Run OpenClaw on a Hetzner CX22 + Docker, paired with Open WebUI."
"Self-host Vaultwarden on my laptop, expose via Cloudflare Tunnel."
"Deploy Mastodon on a Hetzner VPS — I'll bring my own SMTP."
A self-improving catalog (the key idea)
Raw Claude Code starts from zero every session. open-forge accumulates — every deploy can feed gotchas back into the catalog so the next user starts further ahead.
you deploy ─► skill captures gotchas ─► you review + opt in to share
▲ │
│ ▼
└─ improved recipe ◄─ AI agent patches ◄─ sanitized issue
The loop:
- You deploy. Skill walks you through provisioning, DNS, TLS, SMTP, hardening — recording state for resume.
- Skill drafts a sanitized issue at the end with the gotchas it observed and proposed recipe edits. Domains, IPs, API keys, AWS account IDs are stripped before you see the draft.
- You review and opt in (or don't — never auto-posted). One click; takes seconds.
- An AI agent processes the issue — re-fetches upstream docs, applies the strict doc-verification policy, patches the recipe, opens a PR, bumps the version.
- The next user gets the improved recipe.
That's why captured tribal knowledge already includes things like "OpenClaw's three installers (install.sh, install-cli.sh, install.ps1) don't share state — pick one and stick with it", "the Lightsail OpenClaw blueprint runs the gateway as a systemd USER unit with loginctl enable-linger so it survives no-login sessions", "on Windows, OpenClaw's iwr | iex failures are non-fatal to the shell — silent partial installs are common, always check the explicit success line", and "Bitnami's bncert-tool won't accept --unattended" — none of which are in any upstream README.
Other reasons it's better than raw Claude Code
- Resumable across sessions — phased workflow + state file at
~/.open-forge/deployments/<name>.yaml. If TLS fails at 11pm, resume from thetlsphase tomorrow. - Consistent across clouds — "install Docker on Ubuntu" is written once and reused for Hetzner / DO / Lightsail / localhost. Swap clouds without re-deriving.
- Source-attributed — every install method cites the upstream URL it derives from. When upstream drifts, the link is the recovery path.
Coverage
- Software: ~180 verified recipes for popular self-hostable apps — AI stack (Ollama · vLLM · Open WebUI · …), publishing (Ghost · WordPress · …), productivity (Nextcloud · Joplin · …), photos & media (Immich · Jellyfin · …), monitoring, security, networking, communication, automation. Plus live-derived fallback for anything else with public docs (best-effort; you'll see a banner before it starts).
- Where: any cloud VM (AWS · Azure · GCP · Hetzner · DigitalOcean · Oracle Always-Free ARM · Hostinger), your own machine, Raspberry Pi, macOS VM (Lume), any Kubernetes cluster (EKS · GKE · AKS · DOKS · k3s · kind), or PaaS (Fly.io · Render · Railway · Northflank · exe.dev).
- How: Docker · Podman · Native · Kubernetes (Kustomize-first; Helm where upstream ships one).
📖 Browse the catalog: deepwiki.com/zhangqi444/open-forge — auto-generated wiki view of every recipe, infra adapter, and module. Stays current with the repo.
Or just ask Claude — "self-host X on Y" — and it'll match.
Contributing
File an issue, don't open a PR. Issue templates cover three channels:
- Recipe feedback — the skill drafts this for you at end of deploy (sanitized; you opt in)
- Software nomination — request a recipe for an app the catalog doesn't have
- Method proposal — an upstream install method an existing recipe doesn't cover
An AI agent reads CLAUDE.md as its runbook, re-verifies every change against upstream docs, and patches the catalog. Why issues, not PRs? Central verification keeps the catalog consistent, and the skill sanitizes drafts before posting so credentials don't leak into commit history.
For the architectural details (3-axis model, strict-doc-verification policy, two-tier coverage, sanitization rules), see CLAUDE.md.
License
MIT — fork freely, attribution appreciated.
Reviews (0)
Sign in to leave a review.
Leave a reviewNo results found