Local-first by default
Credentials stay on the operator machine and the app uses the same local cloud and cluster access patterns teams already run.
Clanker Cloud is a local-first desktop app for infrastructure operations. It lets teams ask questions about live environments, inspect topology and cost signals, review change plans, and then approve execution from one workspace.
It is designed for builders shipping AI-built apps, lean DevOps and platform teams, AI researchers, and agent-driven workflows that need live infrastructure context without handing privileged credentials to a hosted copilot layer.
Clanker Cloud is an AI workspace for infrastructure: a local-first desktop app that gathers live context first, generates reviewed plans second, and only acts when an operator approves.
Credentials stay on the operator machine and the app uses the same local cloud and cluster access patterns teams already run.
Works across AWS, GCP, Azure, Kubernetes, Cloudflare, Hetzner, DigitalOcean, GitHub, and bring-your-own AI keys.
Built on the public Clanker CLI so teams can inspect the underlying engine and use the same core agent from the terminal.
The workflow is read-first, plan-second, and explicit-approval-only before infrastructure changes happen.
The current product positioning covers cloud providers, Kubernetes, GitHub, and bring-your-own AI keys from one local operating surface.
The best fit is a team that already has real infrastructure and wants faster answers without another hosted trust boundary.
Move from repo to production plan, keep credentials local, and keep logs, topology, and cost context attached after launch.
Investigate incidents, correlate provider state, review changes, and keep multi-cloud context in one operating surface.
Expose a local MCP surface, use bring-your-own keys, and ground agent output in live environment evidence.
Ask what changed, what is failing, what talks to what, or where the cost anomaly came from.
Ground answers in real resource state, dependencies, cluster signals, and provider evidence.
See the intended impact before anything is created, modified, or destroyed.
Use the local MCP endpoint or the CLI to connect Clanker Cloud into agent workflows and internal tooling.
The product positioning comes directly from the architecture rather than from policy copy alone.
See the request flow, architecture stages, and local-vs-external boundaries.
Compare trust boundaries, provider coverage, and operator control.
Use the canonical category page for the model definition, alternatives, and hosted-vs-local tradeoffs.
No. Cloud consoles remain the source of truth. Clanker Cloud acts as the faster operating layer for investigation, planning, topology, and cross-provider context.
The current positioning covers AWS, GCP, Azure, Kubernetes, Cloudflare, Hetzner, DigitalOcean, GitHub, and bring-your-own AI provider keys.
Because the architecture keeps credentials and operator control on the machine running the app instead of moving privileged access into a hosted copilot layer.
Read the stable architecture explainer or compare Clanker Cloud against the hosted-copilot pattern.