The backend manager lets you query your nSelf database, check service health, restart containers, and review the audit log — all through a plain-English chat interface. No terminal required.
It is part of the nself-claw plugin (Max tier). Once installed, your ɳClaw instance gains a dedicated /admin route that shows a live dashboard backed by your server.
The backend manager is off by default. Enable it by setting CLAW_WEB_PASSWORD on your server. Any non-empty value turns on the admin route and requires that password to log in.
# In your backend .env (or web app env vars)
CLAW_WEB_PASSWORD=your-strong-password
# Then rebuild and restart
nself build
nself restartOpen https://your-claw-domain/admin and enter the password. The session persists in the browser until you clear it manually.
These are safe to run at any time. ɳClaw will execute them without confirmation.
ɳClaw asks for confirmation before running anything that changes state.
restart Hasura)These are disabled by default. Enable them by setting CLAW_ADMIN_ALLOW_DESTRUCTIVE=true. Even then, ɳClaw requires two confirmations before executing.
"How many users signed up this week?"
→ SELECT COUNT(*) FROM users WHERE created_at >= NOW() - INTERVAL '7 days'
"Show the last 5 failed auth attempts"
→ SELECT * FROM auth.audit_log WHERE type = 'signIn' AND error IS NOT NULL ORDER BY created_at DESC LIMIT 5
"What tables are in my database?"
→ SELECT table_name FROM information_schema.tables WHERE table_schema = 'public'
"Is Redis running?"
→ Checks container status and returns uptime + memory usage
"Restart the auth service"
→ Prompts for confirmation, then: docker restart <auth-container-id>ɳClaw never executes SQL that modifies data without your explicit confirmation. The query is shown to you in full before it runs. If the translation looks wrong, type cancel and rephrase.
All operations — reads and writes — are logged to the audit trail. The log is append-only and cannot be modified through the chat interface.
Every backend manager action is recorded with a timestamp, the actor (session identifier), and the operation. The log is stored in your PostgreSQL database and is accessible through:
"Show the audit log from today"SELECT * FROM claw_audit_log ORDER BY created_at DESC# Enable the backend manager (sets CLAW_WEB_PASSWORD and rebuilds)
nself claw admin enable --password your-password
# Disable the backend manager
nself claw admin disable
# Set a new password without disabling
nself claw admin set-password new-password
# View the audit log from the terminal
nself claw admin log
# View the last N entries
nself claw admin log --limit 20
# Clear the audit log (requires --confirm)
nself claw admin log --clear --confirmnself plugin install ai claw mux