diff --git a/README.md b/README.md
index 45d81ba2..6bd04baf 100644
--- a/README.md
+++ b/README.md
@@ -1,669 +1,55 @@
# Spawn
-Conjure your agents!
-
-## Features
-
-- 🔐 **Automatic OAuth** - Seamless authentication with OpenRouter
-- 🔄 **Smart Fallback** - Manual API key entry if OAuth fails
-- 🚀 **One Command Setup** - Get running in minutes
-- 🔧 **Environment Ready** - Pre-configured shell and dependencies
-
-## Usage
-
-#### Claude Code
+One command to launch any AI coding agent on any cloud, pre-configured with [OpenRouter](https://openrouter.ai).
```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/claude.sh)
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/{cloud}/{agent}.sh)
```
-#### OpenClaw
+## Matrix
+
+| | [Sprite](sprite/) | [Hetzner](hetzner/) | [DigitalOcean](digitalocean/) | [Vultr](vultr/) | [Linode](linode/) | [Lambda](lambda/) | [AWS Lightsail](aws-lightsail/) | [GCP](gcp/) | [E2B](e2b/) | [Modal](modal/) |
+|---|---|---|---|---|---|---|---|---|---|---|
+| **Claude Code** | [launch](sprite/claude.sh) | [launch](hetzner/claude.sh) | [launch](digitalocean/claude.sh) | [launch](vultr/claude.sh) | [launch](linode/claude.sh) | [launch](lambda/claude.sh) | [launch](aws-lightsail/claude.sh) | [launch](gcp/claude.sh) | [launch](e2b/claude.sh) | [launch](modal/claude.sh) |
+| **OpenClaw** | [launch](sprite/openclaw.sh) | [launch](hetzner/openclaw.sh) | [launch](digitalocean/openclaw.sh) | [launch](vultr/openclaw.sh) | [launch](linode/openclaw.sh) | [launch](lambda/openclaw.sh) | [launch](aws-lightsail/openclaw.sh) | [launch](gcp/openclaw.sh) | [launch](e2b/openclaw.sh) | [launch](modal/openclaw.sh) |
+| **NanoClaw** | [launch](sprite/nanoclaw.sh) | [launch](hetzner/nanoclaw.sh) | [launch](digitalocean/nanoclaw.sh) | [launch](vultr/nanoclaw.sh) | [launch](linode/nanoclaw.sh) | [launch](lambda/nanoclaw.sh) | [launch](aws-lightsail/nanoclaw.sh) | [launch](gcp/nanoclaw.sh) | [launch](e2b/nanoclaw.sh) | [launch](modal/nanoclaw.sh) |
+| **Aider** | [launch](sprite/aider.sh) | [launch](hetzner/aider.sh) | [launch](digitalocean/aider.sh) | [launch](vultr/aider.sh) | [launch](linode/aider.sh) | [launch](lambda/aider.sh) | [launch](aws-lightsail/aider.sh) | [launch](gcp/aider.sh) | [launch](e2b/aider.sh) | [launch](modal/aider.sh) |
+| **Goose** | [launch](sprite/goose.sh) | [launch](hetzner/goose.sh) | [launch](digitalocean/goose.sh) | [launch](vultr/goose.sh) | [launch](linode/goose.sh) | [launch](lambda/goose.sh) | [launch](aws-lightsail/goose.sh) | [launch](gcp/goose.sh) | [launch](e2b/goose.sh) | [launch](modal/goose.sh) |
+| **Codex CLI** | [launch](sprite/codex.sh) | [launch](hetzner/codex.sh) | [launch](digitalocean/codex.sh) | [launch](vultr/codex.sh) | [launch](linode/codex.sh) | [launch](lambda/codex.sh) | [launch](aws-lightsail/codex.sh) | [launch](gcp/codex.sh) | [launch](e2b/codex.sh) | [launch](modal/codex.sh) |
+| **Open Interpreter** | [launch](sprite/interpreter.sh) | [launch](hetzner/interpreter.sh) | [launch](digitalocean/interpreter.sh) | [launch](vultr/interpreter.sh) | [launch](linode/interpreter.sh) | [launch](lambda/interpreter.sh) | [launch](aws-lightsail/interpreter.sh) | [launch](gcp/interpreter.sh) | [launch](e2b/interpreter.sh) | [launch](modal/interpreter.sh) |
+| **Gemini CLI** | [launch](sprite/gemini.sh) | [launch](hetzner/gemini.sh) | [launch](digitalocean/gemini.sh) | [launch](vultr/gemini.sh) | [launch](linode/gemini.sh) | [launch](lambda/gemini.sh) | [launch](aws-lightsail/gemini.sh) | [launch](gcp/gemini.sh) | [launch](e2b/gemini.sh) | [launch](modal/gemini.sh) |
+| **Amazon Q** | [launch](sprite/amazonq.sh) | [launch](hetzner/amazonq.sh) | [launch](digitalocean/amazonq.sh) | [launch](vultr/amazonq.sh) | [launch](linode/amazonq.sh) | [launch](lambda/amazonq.sh) | [launch](aws-lightsail/amazonq.sh) | [launch](gcp/amazonq.sh) | [launch](e2b/amazonq.sh) | [launch](modal/amazonq.sh) |
+| **Cline** | [launch](sprite/cline.sh) | [launch](hetzner/cline.sh) | [launch](digitalocean/cline.sh) | [launch](vultr/cline.sh) | [launch](linode/cline.sh) | [launch](lambda/cline.sh) | [launch](aws-lightsail/cline.sh) | [launch](gcp/cline.sh) | [launch](e2b/cline.sh) | [launch](modal/cline.sh) |
+
+**10 agents x 10 clouds = 100 combinations.** Every script injects OpenRouter credentials automatically.
+
+## How It Works
+
+Each script:
+1. Authenticates with the cloud provider
+2. Provisions a server/sandbox
+3. Installs the agent + dependencies
+4. Gets your OpenRouter API key (OAuth or manual)
+5. Injects OpenRouter env vars into the shell
+6. Drops you into an interactive session
+
+## Non-Interactive Mode
+
+Skip all prompts by setting env vars:
```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/openclaw.sh)
-```
-
-#### NanoClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/nanoclaw.sh)
-```
-
-#### Aider
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/aider.sh)
-```
-
-#### Goose
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/goose.sh)
-```
-
-#### Codex CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/codex.sh)
-```
-
-#### Open Interpreter
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/interpreter.sh)
-```
-
-#### Gemini CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/gemini.sh)
-```
-### Non-Interactive Mode
-
-#### Amazon Q CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/amazonq.sh)
-```
-For automation or CI/CD, set environment variables:
-
-#### Cline
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/cline.sh)
-```
-#### Claude Code
-
-```bash
-SPRITE_NAME=dev-mk1 \
OPENROUTER_API_KEY=sk-or-v1-xxxxx \
- bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/claude.sh)
+{CLOUD_NAME_VAR}=dev-mk1 \
+ bash <(curl -fsSL https://openrouter.ai/lab/spawn/{cloud}/claude.sh)
```
-#### OpenClaw
+See each cloud's [README](sprite/README.md) for provider-specific env vars.
-```bash
-SPRITE_NAME=dev-mk1 \
-OPENROUTER_API_KEY=sk-or-v1-xxxxx \
- bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/openclaw.sh)
-```
-
-#### NanoClaw
-
-```bash
-SPRITE_NAME=dev-mk1 \
-OPENROUTER_API_KEY=sk-or-v1-xxxxx \
- bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/nanoclaw.sh)
-```
-
-**Environment Variables:**
-- `SPRITE_NAME` - Name for the sprite (skips prompt)
-- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly
-
----
-
-## Hetzner Cloud
-
-Spawn agents on [Hetzner Cloud](https://www.hetzner.com/cloud/) servers. No `hcloud` CLI needed — uses the Hetzner REST API directly.
-
-### Usage
-
-#### Claude Code
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/claude.sh)
-```
-
-#### OpenClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/openclaw.sh)
-```
-
-#### NanoClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/nanoclaw.sh)
-```
-
-#### Aider
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/aider.sh)
-```
-
-#### Goose
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/goose.sh)
-```
-
-#### Codex CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/codex.sh)
-```
-
-#### Open Interpreter
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/interpreter.sh)
-```
-
-#### Gemini CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/gemini.sh)
-```
-### Non-Interactive Mode
-
-#### Amazon Q CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/amazonq.sh)
-```
-```bash
-HETZNER_SERVER_NAME=dev-mk1 \
-HCLOUD_TOKEN=your-hetzner-api-token \
-OPENROUTER_API_KEY=sk-or-v1-xxxxx \
- bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/claude.sh)
-```
-
-#### Cline
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/cline.sh)
-```
-**Environment Variables:**
-- `HETZNER_SERVER_NAME` - Name for the server (skips prompt)
-- `HCLOUD_TOKEN` - Hetzner Cloud API token (skips prompt, saved to `~/.config/spawn/hetzner.json`)
-- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly
-- `HETZNER_SERVER_TYPE` - Server type (default: `cx22`)
-- `HETZNER_LOCATION` - Datacenter location (default: `fsn1`)
-
----
-
-## DigitalOcean
-
-Spawn agents on [DigitalOcean](https://www.digitalocean.com/) Droplets via REST API.
-
-### Usage
-
-#### Claude Code
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/claude.sh)
-```
-
-#### OpenClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/openclaw.sh)
-```
-
-#### NanoClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/nanoclaw.sh)
-```
-
-#### Aider
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/aider.sh)
-```
-
-#### Goose
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/goose.sh)
-```
-
-#### Codex CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/codex.sh)
-```
-
-#### Open Interpreter
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/interpreter.sh)
-```
-
-#### Gemini CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/gemini.sh)
-```
-### Non-Interactive Mode
-
-#### Amazon Q CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/amazonq.sh)
-```
-```bash
-DO_DROPLET_NAME=dev-mk1 \
-DO_API_TOKEN=your-digitalocean-api-token \
-OPENROUTER_API_KEY=sk-or-v1-xxxxx \
- bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/claude.sh)
-```
-
-#### Cline
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/cline.sh)
-```
-**Environment Variables:**
-- `DO_DROPLET_NAME` - Name for the droplet (skips prompt)
-- `DO_API_TOKEN` - DigitalOcean API token (skips prompt, saved to `~/.config/spawn/digitalocean.json`)
-- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly
-- `DO_DROPLET_SIZE` - Droplet size (default: `s-2vcpu-2gb`)
-- `DO_REGION` - Datacenter region (default: `nyc3`)
-
----
-
-## Vultr
-
-Spawn agents on [Vultr](https://www.vultr.com/) Cloud Compute instances via REST API.
-
-### Usage
-
-#### Claude Code
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/claude.sh)
-```
-
-#### OpenClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/openclaw.sh)
-```
-
-#### NanoClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/nanoclaw.sh)
-```
-
-#### Aider
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/aider.sh)
-```
-
-#### Goose
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/goose.sh)
-```
-
-#### Codex CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/codex.sh)
-```
-
-#### Open Interpreter
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/interpreter.sh)
-```
-
-#### Gemini CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/gemini.sh)
-```
-### Non-Interactive Mode
-
-#### Amazon Q CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/amazonq.sh)
-```
-```bash
-VULTR_SERVER_NAME=dev-mk1 \
-VULTR_API_KEY=your-vultr-api-key \
-OPENROUTER_API_KEY=sk-or-v1-xxxxx \
- bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/claude.sh)
-```
-
-#### Cline
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/cline.sh)
-```
-**Environment Variables:**
-- `VULTR_SERVER_NAME` - Name for the instance (skips prompt)
-- `VULTR_API_KEY` - Vultr API key (skips prompt, saved to `~/.config/spawn/vultr.json`)
-- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly
-- `VULTR_PLAN` - Instance plan (default: `vc2-1c-2gb`)
-- `VULTR_REGION` - Datacenter region (default: `ewr`)
-
----
-
-## Linode (Akamai)
-
-Spawn agents on [Linode](https://www.linode.com/) instances via REST API.
-
-### Usage
-
-#### Claude Code
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/claude.sh)
-```
-
-#### OpenClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/openclaw.sh)
-```
-
-#### NanoClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/nanoclaw.sh)
-```
-
-#### Aider
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/aider.sh)
-```
-
-#### Goose
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/goose.sh)
-```
-
-#### Codex CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/codex.sh)
-```
-
-#### Open Interpreter
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/interpreter.sh)
-```
-
-#### Gemini CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/gemini.sh)
-```
-### Non-Interactive Mode
-
-#### Amazon Q CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/amazonq.sh)
-```
-```bash
-LINODE_SERVER_NAME=dev-mk1 \
-LINODE_API_TOKEN=your-linode-api-token \
-OPENROUTER_API_KEY=sk-or-v1-xxxxx \
- bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/claude.sh)
-```
-
-#### Cline
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/cline.sh)
-```
-**Environment Variables:**
-- `LINODE_SERVER_NAME` - Label for the Linode (skips prompt)
-- `LINODE_API_TOKEN` - Linode API token (skips prompt, saved to `~/.config/spawn/linode.json`)
-- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly
-- `LINODE_TYPE` - Instance type (default: `g6-standard-1`)
-- `LINODE_REGION` - Datacenter region (default: `us-east`)
-
----
-
-## AWS Lightsail
-
-Spawn agents on [AWS Lightsail](https://aws.amazon.com/lightsail/) instances. Requires AWS CLI installed and configured (`aws configure`).
-
-### Usage
-
-#### Claude Code
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/claude.sh)
-```
-
-#### OpenClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/openclaw.sh)
-```
-
-#### NanoClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/nanoclaw.sh)
-```
-
-#### Aider
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/aider.sh)
-```
-
-#### Goose
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/goose.sh)
-```
-
-#### Codex CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/codex.sh)
-```
-
-#### Open Interpreter
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/interpreter.sh)
-```
-
-#### Gemini CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/gemini.sh)
-```
-### Non-Interactive Mode
-
-#### Amazon Q CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/amazonq.sh)
-```
-```bash
-LIGHTSAIL_SERVER_NAME=dev-mk1 \
-OPENROUTER_API_KEY=sk-or-v1-xxxxx \
- bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/claude.sh)
-```
-
-#### Cline
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/cline.sh)
-```
-**Environment Variables:**
-- `LIGHTSAIL_SERVER_NAME` - Name for the instance (skips prompt)
-- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly
-- `LIGHTSAIL_BUNDLE` - Instance bundle (default: `medium_3_0`)
-- `LIGHTSAIL_REGION` - AWS region (default: `us-east-1`)
-
----
-
-## Lambda Cloud
-
-Spawn agents on [Lambda Cloud](https://lambdalabs.com/) GPU instances via REST API. Great for GPU-accelerated AI workloads.
-
-### Usage
-
-#### Claude Code
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/claude.sh)
-```
-
-#### OpenClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/openclaw.sh)
-```
-
-#### NanoClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/nanoclaw.sh)
-```
-
-#### Aider
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/aider.sh)
-```
-
-#### Goose
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/goose.sh)
-```
-
-#### Codex CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/codex.sh)
-```
-
-#### Open Interpreter
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/interpreter.sh)
-```
-
-#### Gemini CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/gemini.sh)
-```
-
-#### Amazon Q CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/amazonq.sh)
-```
-### Non-Interactive Mode
-
-#### Cline
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/cline.sh)
-```
-```bash
-LAMBDA_SERVER_NAME=dev-mk1 \
-LAMBDA_API_KEY=your-lambda-api-key \
-OPENROUTER_API_KEY=sk-or-v1-xxxxx \
- bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/claude.sh)
-```
-
-**Environment Variables:**
-- `LAMBDA_SERVER_NAME` - Name for the instance (skips prompt)
-- `LAMBDA_API_KEY` - Lambda API key (skips prompt, saved to `~/.config/spawn/lambda.json`)
-- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly
-- `LAMBDA_INSTANCE_TYPE` - Instance type (default: `gpu_1x_a10`)
-- `LAMBDA_REGION` - Region (default: `us-east-1`)
-
----
-
-## GCP Compute Engine
-
-Spawn agents on [Google Cloud Compute Engine](https://cloud.google.com/compute) instances. Requires `gcloud` CLI installed and configured.
-
-### Usage
-
-#### Claude Code
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/claude.sh)
-```
-
-#### OpenClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/openclaw.sh)
-```
-
-#### NanoClaw
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/nanoclaw.sh)
-```
-
-#### Aider
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/aider.sh)
-```
-
-#### Goose
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/goose.sh)
-```
-
-#### Codex CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/codex.sh)
-```
-
-#### Open Interpreter
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/interpreter.sh)
-```
-
-#### Gemini CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/gemini.sh)
-```
-
-#### Amazon Q CLI
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/amazonq.sh)
-```
-
-#### Cline
-
-```bash
-bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/cline.sh)
-```
-
-### Non-Interactive Mode
+## Self-Improving
```bash
-GCP_INSTANCE_NAME=dev-mk1 \
-OPENROUTER_API_KEY=sk-or-v1-xxxxx \
- bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/claude.sh)
+./improve.sh # agent team fills gaps + discovers new agents/clouds
+./improve.sh --loop # continuous improvement cycles
```
-**Environment Variables:**
-- `GCP_INSTANCE_NAME` - Name for the instance (skips prompt)
-- `GCP_PROJECT` - GCP project ID (defaults to gcloud config)
-- `OPENROUTER_API_KEY` - Skip OAuth and use this API key directly
-- `GCP_MACHINE_TYPE` - Machine type (default: `e2-medium`)
-- `GCP_ZONE` - Compute zone (default: `us-central1-a`)
+Uses [Claude Code Agent Teams](https://code.claude.com/docs/en/agent-teams) to coordinate parallel work.
diff --git a/aws-lightsail/README.md b/aws-lightsail/README.md
new file mode 100644
index 00000000..3b60b3c2
--- /dev/null
+++ b/aws-lightsail/README.md
@@ -0,0 +1,75 @@
+# AWS Lightsail
+
+AWS Lightsail instances via AWS CLI. [AWS Lightsail](https://aws.amazon.com/lightsail/)
+
+> Uses 'ubuntu' user instead of 'root'. Requires AWS CLI installed and configured.
+
+## Agents
+
+#### Claude Code
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/claude.sh)
+```
+
+#### OpenClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/openclaw.sh)
+```
+
+#### NanoClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/nanoclaw.sh)
+```
+
+#### Aider
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/aider.sh)
+```
+
+#### Goose
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/goose.sh)
+```
+
+#### Codex CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/codex.sh)
+```
+
+#### Open Interpreter
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/interpreter.sh)
+```
+
+#### Gemini CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/gemini.sh)
+```
+
+#### Amazon Q CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/amazonq.sh)
+```
+
+#### Cline
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/cline.sh)
+```
+
+## Non-Interactive Mode
+
+```bash
+LIGHTSAIL_SERVER_NAME=dev-mk1 \
+OPENROUTER_API_KEY=sk-or-v1-xxxxx \
+ bash <(curl -fsSL https://openrouter.ai/lab/spawn/aws-lightsail/claude.sh)
+```
diff --git a/digitalocean/README.md b/digitalocean/README.md
new file mode 100644
index 00000000..fdf1877f
--- /dev/null
+++ b/digitalocean/README.md
@@ -0,0 +1,74 @@
+# DigitalOcean
+
+DigitalOcean Droplets via REST API. [DigitalOcean](https://www.digitalocean.com/)
+
+## Agents
+
+#### Claude Code
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/claude.sh)
+```
+
+#### OpenClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/openclaw.sh)
+```
+
+#### NanoClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/nanoclaw.sh)
+```
+
+#### Aider
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/aider.sh)
+```
+
+#### Goose
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/goose.sh)
+```
+
+#### Codex CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/codex.sh)
+```
+
+#### Open Interpreter
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/interpreter.sh)
+```
+
+#### Gemini CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/gemini.sh)
+```
+
+#### Amazon Q CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/amazonq.sh)
+```
+
+#### Cline
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/cline.sh)
+```
+
+## Non-Interactive Mode
+
+```bash
+DO_DROPLET_NAME=dev-mk1 \
+DO_API_TOKEN=your-token \
+OPENROUTER_API_KEY=sk-or-v1-xxxxx \
+ bash <(curl -fsSL https://openrouter.ai/lab/spawn/digitalocean/claude.sh)
+```
diff --git a/e2b/README.md b/e2b/README.md
new file mode 100644
index 00000000..5c26a57f
--- /dev/null
+++ b/e2b/README.md
@@ -0,0 +1,76 @@
+# E2B
+
+E2B sandboxed cloud containers via CLI/SDK. [E2B](https://e2b.dev)
+
+> No SSH — uses E2B CLI for exec. Sandboxes start in ~150ms. Requires npm install -g @e2b/cli.
+
+## Agents
+
+#### Claude Code
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/claude.sh)
+```
+
+#### OpenClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/openclaw.sh)
+```
+
+#### NanoClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/nanoclaw.sh)
+```
+
+#### Aider
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/aider.sh)
+```
+
+#### Goose
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/goose.sh)
+```
+
+#### Codex CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/codex.sh)
+```
+
+#### Open Interpreter
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/interpreter.sh)
+```
+
+#### Gemini CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/gemini.sh)
+```
+
+#### Amazon Q CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/amazonq.sh)
+```
+
+#### Cline
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/cline.sh)
+```
+
+## Non-Interactive Mode
+
+```bash
+E2B_SANDBOX_NAME=dev-mk1 \
+E2B_API_KEY=your-key \
+OPENROUTER_API_KEY=sk-or-v1-xxxxx \
+ bash <(curl -fsSL https://openrouter.ai/lab/spawn/e2b/claude.sh)
+```
diff --git a/e2b/aider.sh b/e2b/aider.sh
new file mode 100755
index 00000000..66ae2313
--- /dev/null
+++ b/e2b/aider.sh
@@ -0,0 +1,69 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh)
+fi
+
+log_info "Aider on E2B"
+echo ""
+
+# 1. Ensure E2B CLI and API token
+ensure_e2b_cli
+ensure_e2b_token
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Aider
+log_warn "Installing Aider..."
+run_server "pip install aider-chat 2>/dev/null || pip3 install aider-chat"
+log_info "Aider installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Get model preference
+echo ""
+log_warn "Browse models at: https://openrouter.ai/models"
+log_warn "Which model would you like to use with Aider?"
+MODEL_ID=$(safe_read "Enter model ID [openrouter/auto]: ") || MODEL_ID=""
+MODEL_ID="${MODEL_ID:-openrouter/auto}"
+
+# 7. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "E2B sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)"
+echo ""
+
+# 8. Start Aider interactively
+log_warn "Starting Aider..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && aider --model openrouter/${MODEL_ID}"
diff --git a/e2b/amazonq.sh b/e2b/amazonq.sh
new file mode 100755
index 00000000..f15da535
--- /dev/null
+++ b/e2b/amazonq.sh
@@ -0,0 +1,64 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh)
+fi
+
+log_info "Amazon Q on E2B"
+echo ""
+
+# 1. Ensure E2B CLI and API token
+ensure_e2b_cli
+ensure_e2b_token
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Amazon Q CLI
+log_warn "Installing Amazon Q CLI..."
+run_server "curl -fsSL https://desktop-release.q.us-east-1.amazonaws.com/latest/amazon-q-cli-install.sh | bash"
+log_info "Amazon Q CLI installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_BASE_URL="https://openrouter.ai/api/v1"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "E2B sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)"
+echo ""
+
+# 7. Start Amazon Q interactively
+log_warn "Starting Amazon Q..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && q chat"
diff --git a/e2b/claude.sh b/e2b/claude.sh
new file mode 100755
index 00000000..121c77c7
--- /dev/null
+++ b/e2b/claude.sh
@@ -0,0 +1,111 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh)
+fi
+
+log_info "Claude Code on E2B"
+echo ""
+
+# 1. Ensure E2B CLI and API token
+ensure_e2b_cli
+ensure_e2b_token
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Verify Claude Code is installed (fallback to manual install)
+log_warn "Verifying Claude Code installation..."
+if ! run_server "command -v claude" >/dev/null 2>&1; then
+ log_warn "Claude Code not found, installing manually..."
+ run_server "curl -fsSL https://claude.ai/install.sh | bash"
+fi
+log_info "Claude Code is installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export ANTHROPIC_BASE_URL="https://openrouter.ai/api"
+export ANTHROPIC_AUTH_TOKEN="${OPENROUTER_API_KEY}"
+export ANTHROPIC_API_KEY=""
+export CLAUDE_CODE_SKIP_ONBOARDING="1"
+export CLAUDE_CODE_ENABLE_TELEMETRY="0"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+# 7. Configure Claude Code settings
+log_warn "Configuring Claude Code..."
+
+run_server "mkdir -p ~/.claude"
+
+# Upload settings.json
+SETTINGS_TEMP=$(mktemp)
+cat > "$SETTINGS_TEMP" << EOF
+{
+ "theme": "dark",
+ "editor": "vim",
+ "env": {
+ "CLAUDE_CODE_ENABLE_TELEMETRY": "0",
+ "ANTHROPIC_BASE_URL": "https://openrouter.ai/api",
+ "ANTHROPIC_AUTH_TOKEN": "${OPENROUTER_API_KEY}"
+ },
+ "permissions": {
+ "defaultMode": "bypassPermissions",
+ "dangerouslySkipPermissions": true
+ }
+}
+EOF
+
+upload_file "$SETTINGS_TEMP" ~/.claude/settings.json
+rm "$SETTINGS_TEMP"
+
+# Upload ~/.claude.json global state
+GLOBAL_STATE_TEMP=$(mktemp)
+cat > "$GLOBAL_STATE_TEMP" << EOF
+{
+ "hasCompletedOnboarding": true,
+ "bypassPermissionsModeAccepted": true
+}
+EOF
+
+upload_file "$GLOBAL_STATE_TEMP" ~/.claude.json
+rm "$GLOBAL_STATE_TEMP"
+
+# Create empty CLAUDE.md
+run_server "touch ~/.claude/CLAUDE.md"
+
+echo ""
+log_info "E2B sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)"
+echo ""
+
+# 8. Start Claude Code interactively
+log_warn "Starting Claude Code..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && claude"
diff --git a/e2b/cline.sh b/e2b/cline.sh
new file mode 100755
index 00000000..ddc0ac4b
--- /dev/null
+++ b/e2b/cline.sh
@@ -0,0 +1,64 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh)
+fi
+
+log_info "Cline on E2B"
+echo ""
+
+# 1. Ensure E2B CLI and API token
+ensure_e2b_cli
+ensure_e2b_token
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Cline
+log_warn "Installing Cline..."
+run_server "npm install -g cline"
+log_info "Cline installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_BASE_URL="https://openrouter.ai/api/v1"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "E2B sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)"
+echo ""
+
+# 7. Start Cline interactively
+log_warn "Starting Cline..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && cline"
diff --git a/e2b/codex.sh b/e2b/codex.sh
new file mode 100755
index 00000000..a87ea87a
--- /dev/null
+++ b/e2b/codex.sh
@@ -0,0 +1,64 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh)
+fi
+
+log_info "Codex CLI on E2B"
+echo ""
+
+# 1. Ensure E2B CLI and API token
+ensure_e2b_cli
+ensure_e2b_token
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Codex CLI
+log_warn "Installing Codex CLI..."
+run_server "npm install -g @openai/codex"
+log_info "Codex CLI installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_BASE_URL="https://openrouter.ai/api/v1"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "E2B sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)"
+echo ""
+
+# 7. Start Codex interactively
+log_warn "Starting Codex..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && codex"
diff --git a/e2b/gemini.sh b/e2b/gemini.sh
new file mode 100755
index 00000000..2ca1ca1a
--- /dev/null
+++ b/e2b/gemini.sh
@@ -0,0 +1,65 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh)
+fi
+
+log_info "Gemini CLI on E2B"
+echo ""
+
+# 1. Ensure E2B CLI and API token
+ensure_e2b_cli
+ensure_e2b_token
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Gemini CLI
+log_warn "Installing Gemini CLI..."
+run_server "npm install -g @google/gemini-cli"
+log_info "Gemini CLI installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export GEMINI_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_BASE_URL="https://openrouter.ai/api/v1"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "E2B sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)"
+echo ""
+
+# 7. Start Gemini interactively
+log_warn "Starting Gemini..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && gemini"
diff --git a/e2b/goose.sh b/e2b/goose.sh
new file mode 100755
index 00000000..216a5193
--- /dev/null
+++ b/e2b/goose.sh
@@ -0,0 +1,63 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh)
+fi
+
+log_info "Goose on E2B"
+echo ""
+
+# 1. Ensure E2B CLI and API token
+ensure_e2b_cli
+ensure_e2b_token
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Goose
+log_warn "Installing Goose..."
+run_server "CONFIGURE=false curl -fsSL https://github.com/block/goose/releases/latest/download/download_cli.sh | bash"
+log_info "Goose installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export GOOSE_PROVIDER=openrouter
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "E2B sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)"
+echo ""
+
+# 7. Start Goose interactively
+log_warn "Starting Goose..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && goose"
diff --git a/e2b/interpreter.sh b/e2b/interpreter.sh
new file mode 100755
index 00000000..a56a68c8
--- /dev/null
+++ b/e2b/interpreter.sh
@@ -0,0 +1,64 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh)
+fi
+
+log_info "Open Interpreter on E2B"
+echo ""
+
+# 1. Ensure E2B CLI and API token
+ensure_e2b_cli
+ensure_e2b_token
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Open Interpreter
+log_warn "Installing Open Interpreter..."
+run_server "pip install open-interpreter 2>/dev/null || pip3 install open-interpreter"
+log_info "Open Interpreter installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_BASE_URL="https://openrouter.ai/api/v1"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "E2B sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)"
+echo ""
+
+# 7. Start Open Interpreter interactively
+log_warn "Starting Open Interpreter..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && interpreter"
diff --git a/e2b/lib/common.sh b/e2b/lib/common.sh
new file mode 100644
index 00000000..ee628c1e
--- /dev/null
+++ b/e2b/lib/common.sh
@@ -0,0 +1,227 @@
+#!/bin/bash
+# Common bash functions for E2B sandbox spawn scripts
+# Uses E2B CLI (e2b) — https://e2b.dev
+# Sandboxes are lightweight VMs that start in ~150ms
+# No SSH — uses `e2b sandbox exec` for commands
+
+# ============================================================
+# Provider-agnostic functions
+# ============================================================
+
+RED='\033[0;31m'
+GREEN='\033[0;32m'
+YELLOW='\033[1;33m'
+NC='\033[0m'
+
+log_info() { echo -e "${GREEN}$1${NC}" >&2; }
+log_warn() { echo -e "${YELLOW}$1${NC}" >&2; }
+log_error() { echo -e "${RED}$1${NC}" >&2; }
+
+safe_read() {
+ local prompt="$1" result=""
+ if [[ -t 0 ]]; then read -p "$prompt" result
+ elif echo -n "" > /dev/tty 2>/dev/null; then read -p "$prompt" result < /dev/tty
+ else log_error "Cannot read input: no TTY available"; return 1; fi
+ echo "$result"
+}
+
+nc_listen() {
+ local port=$1; shift
+ if nc --help 2>&1 | grep -q "BusyBox\|busybox" || nc --help 2>&1 | grep -q "\-p "; then
+ nc -l -p "$port" "$@"
+ else nc -l "$port" "$@"; fi
+}
+
+open_browser() {
+ local url=$1
+ if command -v termux-open-url &>/dev/null; then termux-open-url "$url" /dev/null; then open "$url" /dev/null; then xdg-open "$url" /dev/null; then log_warn "netcat (nc) not found"; return 1; fi
+ local callback_url="http://localhost:${callback_port}/callback"
+ local auth_url="https://openrouter.ai/auth?callback_url=${callback_url}"
+ local oauth_dir=$(mktemp -d) code_file="$oauth_dir/code"
+ log_warn "Starting local OAuth server on port ${callback_port}..."
+ (
+ local success_response='HTTP/1.1 200 OK\r\nContent-Type: text/html\r\nConnection: close\r\n\r\n
Authentication Successful!
You can close this tab
'
+ while true; do
+ local response_file=$(mktemp); echo -e "$success_response" > "$response_file"
+ local request=$(nc_listen "$callback_port" < "$response_file" 2>/dev/null | head -1)
+ local nc_status=$?; rm -f "$response_file"
+ if [[ $nc_status -ne 0 ]]; then break; fi
+ if [[ "$request" == *"/callback?code="* ]]; then
+ echo "$request" | sed -n 's/.*code=\([^ &]*\).*/\1/p' > "$code_file"; break
+ fi
+ done
+ ) /dev/null; then log_warn "Failed to start OAuth server"; rm -rf "$oauth_dir"; return 1; fi
+ log_warn "Opening browser to authenticate with OpenRouter..."; open_browser "$auth_url"
+ local timeout=120 elapsed=0
+ while [[ ! -f "$code_file" ]] && [[ $elapsed -lt $timeout ]]; do sleep 1; ((elapsed++)); done
+ kill $server_pid 2>/dev/null || true; wait $server_pid 2>/dev/null || true
+ if [[ ! -f "$code_file" ]]; then log_warn "OAuth timeout"; rm -rf "$oauth_dir"; return 1; fi
+ local oauth_code=$(cat "$code_file"); rm -rf "$oauth_dir"
+ log_warn "Exchanging OAuth code for API key..."
+ local key_response=$(curl -s -X POST "https://openrouter.ai/api/v1/auth/keys" \
+ -H "Content-Type: application/json" -d "{\"code\": \"$oauth_code\"}")
+ local api_key=$(echo "$key_response" | grep -o '"key":"[^"]*"' | sed 's/"key":"//;s/"$//')
+ if [[ -z "$api_key" ]]; then log_error "Failed to exchange OAuth code: ${key_response}"; return 1; fi
+ log_info "Successfully obtained OpenRouter API key via OAuth!"; echo "$api_key"
+}
+
+get_openrouter_api_key_oauth() {
+ local callback_port=${1:-5180}
+ local api_key=$(try_oauth_flow "$callback_port")
+ if [[ -n "$api_key" ]]; then echo "$api_key"; return 0; fi
+ echo ""; log_warn "OAuth authentication failed or unavailable"
+ log_warn "You can enter your API key manually instead"; echo ""
+ local manual_choice=$(safe_read "Would you like to enter your API key manually? (Y/n): ") || {
+ log_error "Cannot prompt for manual entry in non-interactive mode"
+ log_warn "Set OPENROUTER_API_KEY environment variable for non-interactive usage"; return 1
+ }
+ if [[ ! "$manual_choice" =~ ^[Nn]$ ]]; then
+ api_key=$(get_openrouter_api_key_manual); echo "$api_key"; return 0
+ else log_error "Authentication cancelled by user"; return 1; fi
+}
+
+# ============================================================
+# E2B specific functions
+# ============================================================
+
+ensure_e2b_cli() {
+ if ! command -v e2b &>/dev/null; then
+ log_warn "Installing E2B CLI..."
+ npm install -g @e2b/cli 2>/dev/null || {
+ log_error "Failed to install E2B CLI. Install manually: npm install -g @e2b/cli"
+ return 1
+ }
+ fi
+ log_info "E2B CLI available"
+}
+
+ensure_e2b_token() {
+ if [[ -n "$E2B_API_KEY" ]]; then
+ log_info "Using E2B API key from environment"; return 0
+ fi
+ local config_dir="$HOME/.config/spawn" config_file="$config_dir/e2b.json"
+ if [[ -f "$config_file" ]]; then
+ local saved_key=$(python3 -c "import json; print(json.load(open('$config_file')).get('api_key',''))" 2>/dev/null)
+ if [[ -n "$saved_key" ]]; then
+ export E2B_API_KEY="$saved_key"
+ log_info "Using E2B API key from $config_file"; return 0
+ fi
+ fi
+ echo ""; log_warn "E2B API Key Required"
+ echo -e "${YELLOW}Get your API key from: https://e2b.dev/dashboard${NC}"; echo ""
+ local api_key=$(safe_read "Enter your E2B API key: ") || return 1
+ if [[ -z "$api_key" ]]; then log_error "API key is required"; return 1; fi
+ export E2B_API_KEY="$api_key"
+ mkdir -p "$config_dir"
+ cat > "$config_file" << EOF
+{
+ "api_key": "$api_key"
+}
+EOF
+ chmod 600 "$config_file"
+ log_info "API key saved to $config_file"
+}
+
+get_server_name() {
+ if [[ -n "$E2B_SANDBOX_NAME" ]]; then
+ log_info "Using sandbox name from environment: $E2B_SANDBOX_NAME"
+ echo "$E2B_SANDBOX_NAME"; return 0
+ fi
+ local name=$(safe_read "Enter sandbox name: ")
+ if [[ -z "$name" ]]; then
+ log_error "Sandbox name is required"
+ log_warn "Set E2B_SANDBOX_NAME environment variable for non-interactive usage"; return 1
+ fi
+ echo "$name"
+}
+
+create_server() {
+ local name="$1"
+ local template="${E2B_TEMPLATE:-base}"
+
+ log_warn "Creating E2B sandbox '$name' (template: $template)..."
+
+ # Create sandbox and capture ID
+ local output=$(e2b sandbox create --template "$template" --name "$name" 2>&1)
+ E2B_SANDBOX_ID=$(echo "$output" | grep -oE '[a-z0-9]{8}-[a-z0-9]{4}-[a-z0-9]{4}-[a-z0-9]{4}-[a-z0-9]{12}' | head -1)
+
+ if [[ -z "$E2B_SANDBOX_ID" ]]; then
+ # Try alternate parsing
+ E2B_SANDBOX_ID=$(echo "$output" | grep -oE 'sandbox_[a-zA-Z0-9]+' | head -1)
+ fi
+
+ if [[ -z "$E2B_SANDBOX_ID" ]]; then
+ log_error "Failed to create sandbox: $output"
+ return 1
+ fi
+
+ export E2B_SANDBOX_ID
+ log_info "Sandbox created: ID=$E2B_SANDBOX_ID"
+}
+
+wait_for_cloud_init() {
+ log_warn "Installing base tools in sandbox..."
+ run_server "apt-get update -y && apt-get install -y curl unzip git zsh" >/dev/null 2>&1 || true
+ run_server "curl -fsSL https://bun.sh/install | bash" >/dev/null 2>&1 || true
+ run_server "curl -fsSL https://claude.ai/install.sh | bash" >/dev/null 2>&1 || true
+ run_server 'echo "export PATH=\"\$HOME/.claude/local/bin:\$HOME/.bun/bin:\$PATH\"" >> ~/.bashrc' >/dev/null 2>&1 || true
+ run_server 'echo "export PATH=\"\$HOME/.claude/local/bin:\$HOME/.bun/bin:\$PATH\"" >> ~/.zshrc' >/dev/null 2>&1 || true
+ log_info "Base tools installed"
+}
+
+# E2B uses sandbox exec instead of SSH
+run_server() {
+ local cmd="$1"
+ e2b sandbox exec "$E2B_SANDBOX_ID" -- bash -c "$cmd"
+}
+
+upload_file() {
+ local local_path="$1"
+ local remote_path="$2"
+ # Upload via base64 encoding through exec
+ local content=$(base64 -w0 "$local_path" 2>/dev/null || base64 "$local_path")
+ e2b sandbox exec "$E2B_SANDBOX_ID" -- bash -c "echo '$content' | base64 -d > '$remote_path'"
+}
+
+interactive_session() {
+ local cmd="$1"
+ e2b sandbox exec "$E2B_SANDBOX_ID" -- bash -c "$cmd"
+}
+
+destroy_server() {
+ local sandbox_id="${1:-$E2B_SANDBOX_ID}"
+ log_warn "Destroying sandbox $sandbox_id..."
+ e2b sandbox kill "$sandbox_id" 2>/dev/null || true
+ log_info "Sandbox destroyed"
+}
+
+list_servers() {
+ e2b sandbox list
+}
diff --git a/e2b/nanoclaw.sh b/e2b/nanoclaw.sh
new file mode 100755
index 00000000..339bc6d8
--- /dev/null
+++ b/e2b/nanoclaw.sh
@@ -0,0 +1,78 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh)
+fi
+
+log_info "NanoClaw on E2B"
+echo ""
+
+# 1. Ensure E2B CLI and API token
+ensure_e2b_cli
+ensure_e2b_token
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Node.js deps and clone nanoclaw
+log_warn "Installing tsx..."
+run_server "source ~/.bashrc && bun install -g tsx"
+
+log_warn "Cloning and building nanoclaw..."
+run_server "git clone https://github.com/gavrielc/nanoclaw.git ~/nanoclaw && cd ~/nanoclaw && npm install && npm run build"
+log_info "NanoClaw installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export ANTHROPIC_API_KEY="${OPENROUTER_API_KEY}"
+export ANTHROPIC_BASE_URL="https://openrouter.ai/api"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+# 7. Create nanoclaw .env file
+log_warn "Configuring nanoclaw..."
+
+DOTENV_TEMP=$(mktemp)
+cat > "$DOTENV_TEMP" << EOF
+ANTHROPIC_API_KEY=${OPENROUTER_API_KEY}
+EOF
+
+upload_file "$DOTENV_TEMP" ~/nanoclaw/.env
+rm "$DOTENV_TEMP"
+
+echo ""
+log_info "E2B sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)"
+echo ""
+
+# 8. Start nanoclaw
+log_warn "Starting nanoclaw..."
+log_warn "You will need to scan a WhatsApp QR code to authenticate."
+echo ""
+interactive_session "cd ~/nanoclaw && source ~/.zshrc && npm run dev"
diff --git a/e2b/openclaw.sh b/e2b/openclaw.sh
new file mode 100755
index 00000000..fd0706e0
--- /dev/null
+++ b/e2b/openclaw.sh
@@ -0,0 +1,104 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/e2b/lib/common.sh)
+fi
+
+log_info "OpenClaw on E2B"
+echo ""
+
+# 1. Ensure E2B CLI and API token
+ensure_e2b_cli
+ensure_e2b_token
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install openclaw via bun
+log_warn "Installing openclaw..."
+run_server "source ~/.bashrc && bun install -g openclaw"
+log_info "OpenClaw installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Get model preference
+echo ""
+log_warn "Browse models at: https://openrouter.ai/models"
+log_warn "Which model would you like to use?"
+MODEL_ID=$(safe_read "Enter model ID [openrouter/auto]: ") || MODEL_ID=""
+MODEL_ID="${MODEL_ID:-openrouter/auto}"
+
+# 7. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export ANTHROPIC_API_KEY="${OPENROUTER_API_KEY}"
+export ANTHROPIC_BASE_URL="https://openrouter.ai/api"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+# 8. Configure openclaw
+log_warn "Configuring openclaw..."
+
+run_server "rm -rf ~/.openclaw && mkdir -p ~/.openclaw"
+
+# Generate a random gateway token
+GATEWAY_TOKEN=$(openssl rand -hex 16)
+
+OPENCLAW_CONFIG_TEMP=$(mktemp)
+cat > "$OPENCLAW_CONFIG_TEMP" << EOF
+{
+ "env": {
+ "OPENROUTER_API_KEY": "${OPENROUTER_API_KEY}"
+ },
+ "gateway": {
+ "mode": "local",
+ "auth": {
+ "token": "${GATEWAY_TOKEN}"
+ }
+ },
+ "agents": {
+ "defaults": {
+ "model": {
+ "primary": "openrouter/${MODEL_ID}"
+ }
+ }
+ }
+}
+EOF
+
+upload_file "$OPENCLAW_CONFIG_TEMP" ~/.openclaw/openclaw.json
+rm "$OPENCLAW_CONFIG_TEMP"
+
+echo ""
+log_info "E2B sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $E2B_SANDBOX_ID)"
+echo ""
+
+# 9. Start openclaw gateway in background and launch TUI
+log_warn "Starting openclaw..."
+run_server "source ~/.zshrc && nohup openclaw gateway > /tmp/openclaw-gateway.log 2>&1 &"
+sleep 2
+interactive_session "source ~/.zshrc && openclaw tui"
diff --git a/gcp/README.md b/gcp/README.md
new file mode 100644
index 00000000..87425352
--- /dev/null
+++ b/gcp/README.md
@@ -0,0 +1,75 @@
+# GCP Compute Engine
+
+Google Cloud Compute Engine instances via gcloud CLI. [GCP Compute Engine](https://cloud.google.com/compute)
+
+> Uses current username for SSH. Requires gcloud CLI installed and configured.
+
+## Agents
+
+#### Claude Code
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/claude.sh)
+```
+
+#### OpenClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/openclaw.sh)
+```
+
+#### NanoClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/nanoclaw.sh)
+```
+
+#### Aider
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/aider.sh)
+```
+
+#### Goose
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/goose.sh)
+```
+
+#### Codex CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/codex.sh)
+```
+
+#### Open Interpreter
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/interpreter.sh)
+```
+
+#### Gemini CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/gemini.sh)
+```
+
+#### Amazon Q CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/amazonq.sh)
+```
+
+#### Cline
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/cline.sh)
+```
+
+## Non-Interactive Mode
+
+```bash
+GCP_INSTANCE_NAME=dev-mk1 \
+OPENROUTER_API_KEY=sk-or-v1-xxxxx \
+ bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/claude.sh)
+```
diff --git a/hetzner/README.md b/hetzner/README.md
new file mode 100644
index 00000000..205b68e3
--- /dev/null
+++ b/hetzner/README.md
@@ -0,0 +1,74 @@
+# Hetzner Cloud
+
+Hetzner Cloud servers via REST API. [Hetzner Cloud](https://www.hetzner.com/cloud/)
+
+## Agents
+
+#### Claude Code
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/claude.sh)
+```
+
+#### OpenClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/openclaw.sh)
+```
+
+#### NanoClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/nanoclaw.sh)
+```
+
+#### Aider
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/aider.sh)
+```
+
+#### Goose
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/goose.sh)
+```
+
+#### Codex CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/codex.sh)
+```
+
+#### Open Interpreter
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/interpreter.sh)
+```
+
+#### Gemini CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/gemini.sh)
+```
+
+#### Amazon Q CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/amazonq.sh)
+```
+
+#### Cline
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/cline.sh)
+```
+
+## Non-Interactive Mode
+
+```bash
+HETZNER_SERVER_NAME=dev-mk1 \
+HCLOUD_TOKEN=your-token \
+OPENROUTER_API_KEY=sk-or-v1-xxxxx \
+ bash <(curl -fsSL https://openrouter.ai/lab/spawn/hetzner/claude.sh)
+```
diff --git a/lambda/README.md b/lambda/README.md
new file mode 100644
index 00000000..6534664d
--- /dev/null
+++ b/lambda/README.md
@@ -0,0 +1,76 @@
+# Lambda Cloud
+
+Lambda GPU Cloud instances via REST API. [Lambda Cloud](https://lambdalabs.com/)
+
+> GPU cloud, uses 'ubuntu' user. Manual tool install (no cloud-init).
+
+## Agents
+
+#### Claude Code
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/claude.sh)
+```
+
+#### OpenClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/openclaw.sh)
+```
+
+#### NanoClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/nanoclaw.sh)
+```
+
+#### Aider
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/aider.sh)
+```
+
+#### Goose
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/goose.sh)
+```
+
+#### Codex CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/codex.sh)
+```
+
+#### Open Interpreter
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/interpreter.sh)
+```
+
+#### Gemini CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/gemini.sh)
+```
+
+#### Amazon Q CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/amazonq.sh)
+```
+
+#### Cline
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/cline.sh)
+```
+
+## Non-Interactive Mode
+
+```bash
+LAMBDA_SERVER_NAME=dev-mk1 \
+LAMBDA_API_KEY=your-key \
+OPENROUTER_API_KEY=sk-or-v1-xxxxx \
+ bash <(curl -fsSL https://openrouter.ai/lab/spawn/lambda/claude.sh)
+```
diff --git a/linode/README.md b/linode/README.md
new file mode 100644
index 00000000..4cd319fd
--- /dev/null
+++ b/linode/README.md
@@ -0,0 +1,74 @@
+# Linode (Akamai)
+
+Linode instances via REST API. [Linode (Akamai)](https://www.linode.com/)
+
+## Agents
+
+#### Claude Code
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/claude.sh)
+```
+
+#### OpenClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/openclaw.sh)
+```
+
+#### NanoClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/nanoclaw.sh)
+```
+
+#### Aider
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/aider.sh)
+```
+
+#### Goose
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/goose.sh)
+```
+
+#### Codex CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/codex.sh)
+```
+
+#### Open Interpreter
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/interpreter.sh)
+```
+
+#### Gemini CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/gemini.sh)
+```
+
+#### Amazon Q CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/amazonq.sh)
+```
+
+#### Cline
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/cline.sh)
+```
+
+## Non-Interactive Mode
+
+```bash
+LINODE_SERVER_NAME=dev-mk1 \
+LINODE_API_TOKEN=your-token \
+OPENROUTER_API_KEY=sk-or-v1-xxxxx \
+ bash <(curl -fsSL https://openrouter.ai/lab/spawn/linode/claude.sh)
+```
diff --git a/manifest.json b/manifest.json
index 2cce18ee..faab5c4d 100644
--- a/manifest.json
+++ b/manifest.json
@@ -279,6 +279,34 @@
"image_family": "ubuntu-2404-lts-amd64"
},
"notes": "Uses current username for SSH. Requires gcloud CLI installed and configured."
+ },
+ "e2b": {
+ "name": "E2B",
+ "description": "E2B sandboxed cloud containers via CLI/SDK",
+ "url": "https://e2b.dev",
+ "type": "sandbox",
+ "auth": "E2B_API_KEY",
+ "provision_method": "e2b sandbox create",
+ "exec_method": "e2b sandbox exec",
+ "interactive_method": "e2b sandbox exec (PTY)",
+ "defaults": {
+ "template": "base"
+ },
+ "notes": "No SSH — uses E2B CLI for exec. Sandboxes start in ~150ms. Requires npm install -g @e2b/cli."
+ },
+ "modal": {
+ "name": "Modal",
+ "description": "Modal sandboxed containers via Python SDK",
+ "url": "https://modal.com",
+ "type": "sandbox",
+ "auth": "modal setup",
+ "provision_method": "modal.Sandbox.create() via Python SDK",
+ "exec_method": "sandbox.exec() via Python SDK",
+ "interactive_method": "sandbox.exec(pty=True)",
+ "defaults": {
+ "image": "debian_slim"
+ },
+ "notes": "No SSH — uses Modal Python SDK for exec. Sub-second cold starts. Requires pip install modal."
}
},
"matrix": {
@@ -361,6 +389,26 @@
"gcp/interpreter": "implemented",
"gcp/gemini": "implemented",
"gcp/amazonq": "implemented",
- "gcp/cline": "implemented"
+ "gcp/cline": "implemented",
+ "e2b/claude": "implemented",
+ "e2b/openclaw": "implemented",
+ "e2b/nanoclaw": "implemented",
+ "e2b/aider": "implemented",
+ "e2b/goose": "implemented",
+ "e2b/codex": "implemented",
+ "e2b/interpreter": "implemented",
+ "e2b/gemini": "implemented",
+ "e2b/amazonq": "implemented",
+ "e2b/cline": "implemented",
+ "modal/claude": "implemented",
+ "modal/openclaw": "implemented",
+ "modal/nanoclaw": "implemented",
+ "modal/aider": "implemented",
+ "modal/goose": "implemented",
+ "modal/codex": "implemented",
+ "modal/interpreter": "implemented",
+ "modal/gemini": "implemented",
+ "modal/amazonq": "implemented",
+ "modal/cline": "implemented"
}
}
diff --git a/modal/README.md b/modal/README.md
new file mode 100644
index 00000000..1efe04c7
--- /dev/null
+++ b/modal/README.md
@@ -0,0 +1,75 @@
+# Modal
+
+Modal sandboxed containers via Python SDK. [Modal](https://modal.com)
+
+> No SSH — uses Modal Python SDK for exec. Sub-second cold starts. Requires pip install modal.
+
+## Agents
+
+#### Claude Code
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/claude.sh)
+```
+
+#### OpenClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/openclaw.sh)
+```
+
+#### NanoClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/nanoclaw.sh)
+```
+
+#### Aider
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/aider.sh)
+```
+
+#### Goose
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/goose.sh)
+```
+
+#### Codex CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/codex.sh)
+```
+
+#### Open Interpreter
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/interpreter.sh)
+```
+
+#### Gemini CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/gemini.sh)
+```
+
+#### Amazon Q CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/amazonq.sh)
+```
+
+#### Cline
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/cline.sh)
+```
+
+## Non-Interactive Mode
+
+```bash
+MODAL_SANDBOX_NAME=dev-mk1 \
+OPENROUTER_API_KEY=sk-or-v1-xxxxx \
+ bash <(curl -fsSL https://openrouter.ai/lab/spawn/modal/claude.sh)
+```
diff --git a/modal/aider.sh b/modal/aider.sh
new file mode 100755
index 00000000..a61c85f0
--- /dev/null
+++ b/modal/aider.sh
@@ -0,0 +1,68 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh)
+fi
+
+log_info "Aider on Modal"
+echo ""
+
+# 1. Ensure Modal CLI
+ensure_modal_cli
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Aider
+log_warn "Installing Aider..."
+run_server "pip install aider-chat 2>/dev/null || pip3 install aider-chat"
+log_info "Aider installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Get model preference
+echo ""
+log_warn "Browse models at: https://openrouter.ai/models"
+log_warn "Which model would you like to use with Aider?"
+MODEL_ID=$(safe_read "Enter model ID [openrouter/auto]: ") || MODEL_ID=""
+MODEL_ID="${MODEL_ID:-openrouter/auto}"
+
+# 7. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "Modal sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)"
+echo ""
+
+# 8. Start Aider interactively
+log_warn "Starting Aider..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && aider --model openrouter/${MODEL_ID}"
diff --git a/modal/amazonq.sh b/modal/amazonq.sh
new file mode 100755
index 00000000..3a5260ed
--- /dev/null
+++ b/modal/amazonq.sh
@@ -0,0 +1,63 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh)
+fi
+
+log_info "Amazon Q on Modal"
+echo ""
+
+# 1. Ensure Modal CLI
+ensure_modal_cli
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Amazon Q CLI
+log_warn "Installing Amazon Q CLI..."
+run_server "curl -fsSL https://desktop-release.q.us-east-1.amazonaws.com/latest/amazon-q-cli-install.sh | bash"
+log_info "Amazon Q CLI installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_BASE_URL="https://openrouter.ai/api/v1"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "Modal sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)"
+echo ""
+
+# 7. Start Amazon Q interactively
+log_warn "Starting Amazon Q..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && q chat"
diff --git a/modal/claude.sh b/modal/claude.sh
new file mode 100755
index 00000000..6787f892
--- /dev/null
+++ b/modal/claude.sh
@@ -0,0 +1,110 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh)
+fi
+
+log_info "Claude Code on Modal"
+echo ""
+
+# 1. Ensure Modal CLI
+ensure_modal_cli
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Verify Claude Code is installed (fallback to manual install)
+log_warn "Verifying Claude Code installation..."
+if ! run_server "command -v claude" >/dev/null 2>&1; then
+ log_warn "Claude Code not found, installing manually..."
+ run_server "curl -fsSL https://claude.ai/install.sh | bash"
+fi
+log_info "Claude Code is installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export ANTHROPIC_BASE_URL="https://openrouter.ai/api"
+export ANTHROPIC_AUTH_TOKEN="${OPENROUTER_API_KEY}"
+export ANTHROPIC_API_KEY=""
+export CLAUDE_CODE_SKIP_ONBOARDING="1"
+export CLAUDE_CODE_ENABLE_TELEMETRY="0"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+# 7. Configure Claude Code settings
+log_warn "Configuring Claude Code..."
+
+run_server "mkdir -p ~/.claude"
+
+# Upload settings.json
+SETTINGS_TEMP=$(mktemp)
+cat > "$SETTINGS_TEMP" << EOF
+{
+ "theme": "dark",
+ "editor": "vim",
+ "env": {
+ "CLAUDE_CODE_ENABLE_TELEMETRY": "0",
+ "ANTHROPIC_BASE_URL": "https://openrouter.ai/api",
+ "ANTHROPIC_AUTH_TOKEN": "${OPENROUTER_API_KEY}"
+ },
+ "permissions": {
+ "defaultMode": "bypassPermissions",
+ "dangerouslySkipPermissions": true
+ }
+}
+EOF
+
+upload_file "$SETTINGS_TEMP" ~/.claude/settings.json
+rm "$SETTINGS_TEMP"
+
+# Upload ~/.claude.json global state
+GLOBAL_STATE_TEMP=$(mktemp)
+cat > "$GLOBAL_STATE_TEMP" << EOF
+{
+ "hasCompletedOnboarding": true,
+ "bypassPermissionsModeAccepted": true
+}
+EOF
+
+upload_file "$GLOBAL_STATE_TEMP" ~/.claude.json
+rm "$GLOBAL_STATE_TEMP"
+
+# Create empty CLAUDE.md
+run_server "touch ~/.claude/CLAUDE.md"
+
+echo ""
+log_info "Modal sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)"
+echo ""
+
+# 8. Start Claude Code interactively
+log_warn "Starting Claude Code..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && claude"
diff --git a/modal/cline.sh b/modal/cline.sh
new file mode 100755
index 00000000..98ffe8c4
--- /dev/null
+++ b/modal/cline.sh
@@ -0,0 +1,63 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh)
+fi
+
+log_info "Cline on Modal"
+echo ""
+
+# 1. Ensure Modal CLI
+ensure_modal_cli
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Cline
+log_warn "Installing Cline..."
+run_server "npm install -g cline"
+log_info "Cline installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_BASE_URL="https://openrouter.ai/api/v1"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "Modal sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)"
+echo ""
+
+# 7. Start Cline interactively
+log_warn "Starting Cline..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && cline"
diff --git a/modal/codex.sh b/modal/codex.sh
new file mode 100755
index 00000000..ef5acd21
--- /dev/null
+++ b/modal/codex.sh
@@ -0,0 +1,63 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh)
+fi
+
+log_info "Codex CLI on Modal"
+echo ""
+
+# 1. Ensure Modal CLI
+ensure_modal_cli
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Codex CLI
+log_warn "Installing Codex CLI..."
+run_server "npm install -g @openai/codex"
+log_info "Codex CLI installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_BASE_URL="https://openrouter.ai/api/v1"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "Modal sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)"
+echo ""
+
+# 7. Start Codex interactively
+log_warn "Starting Codex..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && codex"
diff --git a/modal/gemini.sh b/modal/gemini.sh
new file mode 100755
index 00000000..7d6d1c32
--- /dev/null
+++ b/modal/gemini.sh
@@ -0,0 +1,64 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh)
+fi
+
+log_info "Gemini CLI on Modal"
+echo ""
+
+# 1. Ensure Modal CLI
+ensure_modal_cli
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Gemini CLI
+log_warn "Installing Gemini CLI..."
+run_server "npm install -g @google/gemini-cli"
+log_info "Gemini CLI installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export GEMINI_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_BASE_URL="https://openrouter.ai/api/v1"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "Modal sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)"
+echo ""
+
+# 7. Start Gemini interactively
+log_warn "Starting Gemini..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && gemini"
diff --git a/modal/goose.sh b/modal/goose.sh
new file mode 100755
index 00000000..3d07f848
--- /dev/null
+++ b/modal/goose.sh
@@ -0,0 +1,62 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh)
+fi
+
+log_info "Goose on Modal"
+echo ""
+
+# 1. Ensure Modal CLI
+ensure_modal_cli
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Goose
+log_warn "Installing Goose..."
+run_server "CONFIGURE=false curl -fsSL https://github.com/block/goose/releases/latest/download/download_cli.sh | bash"
+log_info "Goose installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export GOOSE_PROVIDER=openrouter
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "Modal sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)"
+echo ""
+
+# 7. Start Goose interactively
+log_warn "Starting Goose..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && goose"
diff --git a/modal/interpreter.sh b/modal/interpreter.sh
new file mode 100755
index 00000000..7fcdbd5b
--- /dev/null
+++ b/modal/interpreter.sh
@@ -0,0 +1,63 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh)
+fi
+
+log_info "Open Interpreter on Modal"
+echo ""
+
+# 1. Ensure Modal CLI
+ensure_modal_cli
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Open Interpreter
+log_warn "Installing Open Interpreter..."
+run_server "pip install open-interpreter 2>/dev/null || pip3 install open-interpreter"
+log_info "Open Interpreter installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_API_KEY="${OPENROUTER_API_KEY}"
+export OPENAI_BASE_URL="https://openrouter.ai/api/v1"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+echo ""
+log_info "Modal sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)"
+echo ""
+
+# 7. Start Open Interpreter interactively
+log_warn "Starting Open Interpreter..."
+sleep 1
+clear
+interactive_session "source ~/.zshrc && interpreter"
diff --git a/modal/lib/common.sh b/modal/lib/common.sh
new file mode 100644
index 00000000..a2f7987b
--- /dev/null
+++ b/modal/lib/common.sh
@@ -0,0 +1,231 @@
+#!/bin/bash
+# Common bash functions for Modal sandbox spawn scripts
+# Uses Modal CLI + Python SDK — https://modal.com
+# Sandboxes are secure containers with sub-second cold starts
+# No SSH — uses `modal sandbox exec` for commands
+
+# ============================================================
+# Provider-agnostic functions
+# ============================================================
+
+RED='\033[0;31m'
+GREEN='\033[0;32m'
+YELLOW='\033[1;33m'
+NC='\033[0m'
+
+log_info() { echo -e "${GREEN}$1${NC}" >&2; }
+log_warn() { echo -e "${YELLOW}$1${NC}" >&2; }
+log_error() { echo -e "${RED}$1${NC}" >&2; }
+
+safe_read() {
+ local prompt="$1" result=""
+ if [[ -t 0 ]]; then read -p "$prompt" result
+ elif echo -n "" > /dev/tty 2>/dev/null; then read -p "$prompt" result < /dev/tty
+ else log_error "Cannot read input: no TTY available"; return 1; fi
+ echo "$result"
+}
+
+nc_listen() {
+ local port=$1; shift
+ if nc --help 2>&1 | grep -q "BusyBox\|busybox" || nc --help 2>&1 | grep -q "\-p "; then
+ nc -l -p "$port" "$@"
+ else nc -l "$port" "$@"; fi
+}
+
+open_browser() {
+ local url=$1
+ if command -v termux-open-url &>/dev/null; then termux-open-url "$url" /dev/null; then open "$url" /dev/null; then xdg-open "$url" /dev/null; then log_warn "netcat (nc) not found"; return 1; fi
+ local callback_url="http://localhost:${callback_port}/callback"
+ local auth_url="https://openrouter.ai/auth?callback_url=${callback_url}"
+ local oauth_dir=$(mktemp -d) code_file="$oauth_dir/code"
+ log_warn "Starting local OAuth server on port ${callback_port}..."
+ (
+ local success_response='HTTP/1.1 200 OK\r\nContent-Type: text/html\r\nConnection: close\r\n\r\nAuthentication Successful!
You can close this tab
'
+ while true; do
+ local response_file=$(mktemp); echo -e "$success_response" > "$response_file"
+ local request=$(nc_listen "$callback_port" < "$response_file" 2>/dev/null | head -1)
+ local nc_status=$?; rm -f "$response_file"
+ if [[ $nc_status -ne 0 ]]; then break; fi
+ if [[ "$request" == *"/callback?code="* ]]; then
+ echo "$request" | sed -n 's/.*code=\([^ &]*\).*/\1/p' > "$code_file"; break
+ fi
+ done
+ ) /dev/null; then log_warn "Failed to start OAuth server"; rm -rf "$oauth_dir"; return 1; fi
+ log_warn "Opening browser to authenticate with OpenRouter..."; open_browser "$auth_url"
+ local timeout=120 elapsed=0
+ while [[ ! -f "$code_file" ]] && [[ $elapsed -lt $timeout ]]; do sleep 1; ((elapsed++)); done
+ kill $server_pid 2>/dev/null || true; wait $server_pid 2>/dev/null || true
+ if [[ ! -f "$code_file" ]]; then log_warn "OAuth timeout"; rm -rf "$oauth_dir"; return 1; fi
+ local oauth_code=$(cat "$code_file"); rm -rf "$oauth_dir"
+ log_warn "Exchanging OAuth code for API key..."
+ local key_response=$(curl -s -X POST "https://openrouter.ai/api/v1/auth/keys" \
+ -H "Content-Type: application/json" -d "{\"code\": \"$oauth_code\"}")
+ local api_key=$(echo "$key_response" | grep -o '"key":"[^"]*"' | sed 's/"key":"//;s/"$//')
+ if [[ -z "$api_key" ]]; then log_error "Failed to exchange OAuth code: ${key_response}"; return 1; fi
+ log_info "Successfully obtained OpenRouter API key via OAuth!"; echo "$api_key"
+}
+
+get_openrouter_api_key_oauth() {
+ local callback_port=${1:-5180}
+ local api_key=$(try_oauth_flow "$callback_port")
+ if [[ -n "$api_key" ]]; then echo "$api_key"; return 0; fi
+ echo ""; log_warn "OAuth authentication failed or unavailable"
+ log_warn "You can enter your API key manually instead"; echo ""
+ local manual_choice=$(safe_read "Would you like to enter your API key manually? (Y/n): ") || {
+ log_error "Cannot prompt for manual entry in non-interactive mode"
+ log_warn "Set OPENROUTER_API_KEY environment variable for non-interactive usage"; return 1
+ }
+ if [[ ! "$manual_choice" =~ ^[Nn]$ ]]; then
+ api_key=$(get_openrouter_api_key_manual); echo "$api_key"; return 0
+ else log_error "Authentication cancelled by user"; return 1; fi
+}
+
+# ============================================================
+# Modal specific functions
+# ============================================================
+
+ensure_modal_cli() {
+ if ! command -v modal &>/dev/null; then
+ log_warn "Installing Modal CLI..."
+ pip install modal 2>/dev/null || pip3 install modal || {
+ log_error "Failed to install Modal. Install manually: pip install modal"
+ return 1
+ }
+ fi
+ # Check if authenticated
+ if ! modal profile current &>/dev/null; then
+ log_warn "Modal not authenticated. Running setup..."
+ modal setup
+ fi
+ log_info "Modal CLI ready"
+}
+
+get_server_name() {
+ if [[ -n "$MODAL_SANDBOX_NAME" ]]; then
+ log_info "Using sandbox name from environment: $MODAL_SANDBOX_NAME"
+ echo "$MODAL_SANDBOX_NAME"; return 0
+ fi
+ local name=$(safe_read "Enter sandbox name: ")
+ if [[ -z "$name" ]]; then
+ log_error "Sandbox name is required"
+ log_warn "Set MODAL_SANDBOX_NAME environment variable for non-interactive usage"; return 1
+ fi
+ echo "$name"
+}
+
+create_server() {
+ local name="$1"
+ local image="${MODAL_IMAGE:-debian_slim}"
+
+ log_warn "Creating Modal sandbox '$name'..."
+
+ # Create sandbox via Python SDK (Modal CLI doesn't have direct sandbox create)
+ MODAL_SANDBOX_ID=$(python3 -c "
+import modal
+app = modal.App.lookup('spawn-${name}', create_if_missing=True)
+sb = modal.Sandbox.create(
+ app=app,
+ name='${name}',
+ image=modal.Image.${image}().apt_install('curl', 'unzip', 'git', 'zsh'),
+ timeout=3600,
+)
+print(sb.object_id)
+" 2>/dev/null)
+
+ if [[ -z "$MODAL_SANDBOX_ID" ]]; then
+ log_error "Failed to create Modal sandbox"
+ return 1
+ fi
+
+ export MODAL_SANDBOX_ID
+ export MODAL_APP_NAME="spawn-${name}"
+ export MODAL_SANDBOX_NAME_ACTUAL="$name"
+ log_info "Sandbox created: ID=$MODAL_SANDBOX_ID"
+}
+
+wait_for_cloud_init() {
+ log_warn "Installing tools in sandbox..."
+ run_server "curl -fsSL https://bun.sh/install | bash" >/dev/null 2>&1 || true
+ run_server "curl -fsSL https://claude.ai/install.sh | bash" >/dev/null 2>&1 || true
+ run_server 'echo "export PATH=\"\$HOME/.claude/local/bin:\$HOME/.bun/bin:\$PATH\"" >> ~/.bashrc' >/dev/null 2>&1 || true
+ run_server 'echo "export PATH=\"\$HOME/.claude/local/bin:\$HOME/.bun/bin:\$PATH\"" >> ~/.zshrc' >/dev/null 2>&1 || true
+ log_info "Tools installed"
+}
+
+# Modal uses Python SDK for exec
+run_server() {
+ local cmd="$1"
+ python3 -c "
+import modal
+sb = modal.Sandbox.from_id('$MODAL_SANDBOX_ID')
+p = sb.exec('bash', '-c', '''$cmd''')
+print(p.stdout.read(), end='')
+if p.stderr.read():
+ import sys; print(p.stderr.read(), end='', file=sys.stderr)
+p.wait()
+"
+}
+
+upload_file() {
+ local local_path="$1"
+ local remote_path="$2"
+ local content=$(base64 -w0 "$local_path" 2>/dev/null || base64 "$local_path")
+ run_server "echo '$content' | base64 -d > '$remote_path'"
+}
+
+interactive_session() {
+ local cmd="$1"
+ python3 -c "
+import modal, sys
+sb = modal.Sandbox.from_id('$MODAL_SANDBOX_ID')
+p = sb.exec('bash', '-c', '''$cmd''', pty=True)
+for line in p.stdout:
+ print(line, end='')
+p.wait()
+"
+}
+
+destroy_server() {
+ local sandbox_id="${1:-$MODAL_SANDBOX_ID}"
+ log_warn "Terminating sandbox..."
+ python3 -c "
+import modal
+sb = modal.Sandbox.from_id('$sandbox_id')
+sb.terminate()
+" 2>/dev/null || true
+ log_info "Sandbox terminated"
+}
+
+list_servers() {
+ python3 -c "
+import modal
+for sb in modal.Sandbox.list():
+ print(f'{sb.object_id} {sb.name or \"unnamed\"}')" 2>/dev/null || echo "No sandboxes found"
+}
diff --git a/modal/nanoclaw.sh b/modal/nanoclaw.sh
new file mode 100755
index 00000000..1e5a95fd
--- /dev/null
+++ b/modal/nanoclaw.sh
@@ -0,0 +1,77 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh)
+fi
+
+log_info "NanoClaw on Modal"
+echo ""
+
+# 1. Ensure Modal CLI
+ensure_modal_cli
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install Node.js deps and clone nanoclaw
+log_warn "Installing tsx..."
+run_server "source ~/.bashrc && bun install -g tsx"
+
+log_warn "Cloning and building nanoclaw..."
+run_server "git clone https://github.com/gavrielc/nanoclaw.git ~/nanoclaw && cd ~/nanoclaw && npm install && npm run build"
+log_info "NanoClaw installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export ANTHROPIC_API_KEY="${OPENROUTER_API_KEY}"
+export ANTHROPIC_BASE_URL="https://openrouter.ai/api"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+# 7. Create nanoclaw .env file
+log_warn "Configuring nanoclaw..."
+
+DOTENV_TEMP=$(mktemp)
+cat > "$DOTENV_TEMP" << EOF
+ANTHROPIC_API_KEY=${OPENROUTER_API_KEY}
+EOF
+
+upload_file "$DOTENV_TEMP" ~/nanoclaw/.env
+rm "$DOTENV_TEMP"
+
+echo ""
+log_info "Modal sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)"
+echo ""
+
+# 8. Start nanoclaw
+log_warn "Starting nanoclaw..."
+log_warn "You will need to scan a WhatsApp QR code to authenticate."
+echo ""
+interactive_session "cd ~/nanoclaw && source ~/.zshrc && npm run dev"
diff --git a/modal/openclaw.sh b/modal/openclaw.sh
new file mode 100755
index 00000000..b0607805
--- /dev/null
+++ b/modal/openclaw.sh
@@ -0,0 +1,103 @@
+#!/bin/bash
+set -e
+
+# Source common functions - try local file first, fall back to remote
+SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
+if [[ -f "$SCRIPT_DIR/lib/common.sh" ]]; then
+ source "$SCRIPT_DIR/lib/common.sh"
+else
+ source <(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/modal/lib/common.sh)
+fi
+
+log_info "OpenClaw on Modal"
+echo ""
+
+# 1. Ensure Modal CLI
+ensure_modal_cli
+
+# 2. Get sandbox name and create sandbox
+SERVER_NAME=$(get_server_name)
+create_server "$SERVER_NAME"
+
+# 3. Wait for base tools
+wait_for_cloud_init
+
+# 4. Install openclaw via bun
+log_warn "Installing openclaw..."
+run_server "source ~/.bashrc && bun install -g openclaw"
+log_info "OpenClaw installed"
+
+# 5. Get OpenRouter API key
+echo ""
+if [[ -n "$OPENROUTER_API_KEY" ]]; then
+ log_info "Using OpenRouter API key from environment"
+else
+ OPENROUTER_API_KEY=$(get_openrouter_api_key_oauth 5180)
+fi
+
+# 6. Get model preference
+echo ""
+log_warn "Browse models at: https://openrouter.ai/models"
+log_warn "Which model would you like to use?"
+MODEL_ID=$(safe_read "Enter model ID [openrouter/auto]: ") || MODEL_ID=""
+MODEL_ID="${MODEL_ID:-openrouter/auto}"
+
+# 7. Inject environment variables into ~/.zshrc
+log_warn "Setting up environment variables..."
+
+ENV_TEMP=$(mktemp)
+cat > "$ENV_TEMP" << EOF
+
+# [spawn:env]
+export OPENROUTER_API_KEY="${OPENROUTER_API_KEY}"
+export ANTHROPIC_API_KEY="${OPENROUTER_API_KEY}"
+export ANTHROPIC_BASE_URL="https://openrouter.ai/api"
+EOF
+
+upload_file "$ENV_TEMP" "/tmp/env_config"
+run_server "cat /tmp/env_config >> ~/.zshrc && rm /tmp/env_config"
+rm "$ENV_TEMP"
+
+# 8. Configure openclaw
+log_warn "Configuring openclaw..."
+
+run_server "rm -rf ~/.openclaw && mkdir -p ~/.openclaw"
+
+# Generate a random gateway token
+GATEWAY_TOKEN=$(openssl rand -hex 16)
+
+OPENCLAW_CONFIG_TEMP=$(mktemp)
+cat > "$OPENCLAW_CONFIG_TEMP" << EOF
+{
+ "env": {
+ "OPENROUTER_API_KEY": "${OPENROUTER_API_KEY}"
+ },
+ "gateway": {
+ "mode": "local",
+ "auth": {
+ "token": "${GATEWAY_TOKEN}"
+ }
+ },
+ "agents": {
+ "defaults": {
+ "model": {
+ "primary": "openrouter/${MODEL_ID}"
+ }
+ }
+ }
+}
+EOF
+
+upload_file "$OPENCLAW_CONFIG_TEMP" ~/.openclaw/openclaw.json
+rm "$OPENCLAW_CONFIG_TEMP"
+
+echo ""
+log_info "Modal sandbox setup completed successfully!"
+log_info "Sandbox: $SERVER_NAME (ID: $MODAL_SANDBOX_ID)"
+echo ""
+
+# 9. Start openclaw gateway in background and launch TUI
+log_warn "Starting openclaw..."
+run_server "source ~/.zshrc && nohup openclaw gateway > /tmp/openclaw-gateway.log 2>&1 &"
+sleep 2
+interactive_session "source ~/.zshrc && openclaw tui"
diff --git a/sprite/README.md b/sprite/README.md
new file mode 100644
index 00000000..8885417d
--- /dev/null
+++ b/sprite/README.md
@@ -0,0 +1,73 @@
+# Sprite
+
+Sprites.dev managed VMs with CLI. [Sprite](https://sprites.dev)
+
+## Agents
+
+#### Claude Code
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/claude.sh)
+```
+
+#### OpenClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/openclaw.sh)
+```
+
+#### NanoClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/nanoclaw.sh)
+```
+
+#### Aider
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/aider.sh)
+```
+
+#### Goose
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/goose.sh)
+```
+
+#### Codex CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/codex.sh)
+```
+
+#### Open Interpreter
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/interpreter.sh)
+```
+
+#### Gemini CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/gemini.sh)
+```
+
+#### Amazon Q CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/amazonq.sh)
+```
+
+#### Cline
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/cline.sh)
+```
+
+## Non-Interactive Mode
+
+```bash
+SPRITE_NAME=dev-mk1 \
+OPENROUTER_API_KEY=sk-or-v1-xxxxx \
+ bash <(curl -fsSL https://openrouter.ai/lab/spawn/sprite/claude.sh)
+```
diff --git a/vultr/README.md b/vultr/README.md
new file mode 100644
index 00000000..713c7dc3
--- /dev/null
+++ b/vultr/README.md
@@ -0,0 +1,74 @@
+# Vultr
+
+Vultr Cloud Compute instances via REST API. [Vultr](https://www.vultr.com/)
+
+## Agents
+
+#### Claude Code
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/claude.sh)
+```
+
+#### OpenClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/openclaw.sh)
+```
+
+#### NanoClaw
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/nanoclaw.sh)
+```
+
+#### Aider
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/aider.sh)
+```
+
+#### Goose
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/goose.sh)
+```
+
+#### Codex CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/codex.sh)
+```
+
+#### Open Interpreter
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/interpreter.sh)
+```
+
+#### Gemini CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/gemini.sh)
+```
+
+#### Amazon Q CLI
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/amazonq.sh)
+```
+
+#### Cline
+
+```bash
+bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/cline.sh)
+```
+
+## Non-Interactive Mode
+
+```bash
+VULTR_SERVER_NAME=dev-mk1 \
+VULTR_API_KEY=your-key \
+OPENROUTER_API_KEY=sk-or-v1-xxxxx \
+ bash <(curl -fsSL https://openrouter.ai/lab/spawn/vultr/claude.sh)
+```