openclaw
SKILL.md
OpenClaw (Operator Playbook)
This skill is self-contained and includes operational documentation directly in this file.
Quick Navigation
- Installation / migration:
references/installation.md - Architecture & multi-agent routing:
references/architecture.md - Extended concepts:
references/concepts.md - Tool governance & safety:
references/tools.md - Gateway runbook & security:
references/gateway.md - Onboarding & first-run:
references/getting-started.md - Channels & providers:
references/channels-and-providers.md - Nodes & remote execution:
references/nodes.md - CLI operations & troubleshooting:
references/operations.md
Core Model
- OpenClaw is gateway-centric: one long-lived Gateway per host is the control plane.
- Clients and nodes connect via typed WebSocket API; channels/providers are orchestrated by gateway.
- Session safety depends on deterministic routing + queueing + explicit policy controls.
Day-1 Setup
- Run onboarding with daemon install.
- Verify gateway health/status.
- Open Control UI/dashboard for first chat.
- Add channels/providers only after baseline health is stable.
If OpenClaw is not installed, use references/installation.md.
Gateway Operations
- Keep default posture loopback + auth enabled.
- For remote access, prefer Tailscale Serve or SSH tunnel over public bind.
- Non-loopback binds require strict token/password controls.
- Use supervised process mode (launchd/systemd) for reliability.
- For config changes, treat
config.applyas controlled rollout andconfig.patchas targeted merge. - Remember patch semantics: objects merge, arrays replace,
nulldeletes.
Release Updates (v2026.3.7)
- BREAKING: Gateway auth now requires explicit
gateway.auth.mode(tokenorpassword) when bothgateway.auth.tokenandgateway.auth.passwordare configured (including SecretRefs). Set before upgrade to avoid startup/pairing failures. - Agents:
ContextEngineplugin interface with full lifecycle hooks (bootstrap,ingest,assemble,compact,afterTurn,prepareSubagentSpawn,onSubagentEnded). Enables alternative context management strategies (e.g.lossless-claw) without modifying core compaction. - Agents: configurable
postCompactionSectionsto choose whichAGENTS.mdsections re-inject after compaction. - Agents: head+tail truncation for oversized tool results (preserves tail diagnostics).
- Telegram: per-topic
agentIdoverrides in forum groups and DM topics for dedicated agent routing with isolated sessions. - Telegram/ACP: durable topic binding (
--thread here|auto), approval buttons with prefixed-id resolution, bind pin confirmations. - ACP: persistent Discord channel and Telegram topic binding storage surviving restarts.
- Plugins:
prependSystemContext/appendSystemContextfor static guidance in system prompt space (provider caching, lower repeated cost). - Plugins:
hooks.allowPromptInjectionpolicy and runtime validation of unknown hook names. - Hooks:
session:compact:before/session:compact:afterevents with session/count metadata. - Config:
recentTurnsPreserveand quality-guard retry knobs exposed through validated config. - Tools/Web search: Perplexity provider switched to Search API with structured results + language/region/time filters.
- Tools/Diffs: guidance moved from prompt-hook injection to companion skill path (reduces unrelated-turn noise).
- Gateway: SecretRef support for
gateway.auth.tokenwith auth-mode guardrails. - Docker: multi-stage build producing minimal runtime image;
OPENCLAW_VARIANT=slimbuild arg;OPENCLAW_EXTENSIONSfor pre-baking extension dependencies. - TTS:
messages.tts.openai.baseUrlconfig support for OpenAI-compatible endpoints. - Google: first-class
gemini-3.1-flash-lite-previewsupport. - Slack:
typingReactionfor DM processing status when assistant typing unavailable. - Discord:
allowBots: "mentions"to gate bot messages by mention. - Mattermost: interactive
/oc_modelprovider/model browsing. - Cron:
jobs.json.bakpreserved as pre-edit snapshot for recovery.
Release Updates (v2026.3.2)
- BREAKING: New installs default
tools.profiletomessaging(not broad coding/system). If you expect coding tools on day-1, settools.profileexplicitly. - BREAKING: ACP dispatch defaults to enabled unless explicitly disabled (
acp.dispatch.enabled=false). - BREAKING: Plugin SDK removed
api.registerHttpHandler(...); useapi.registerHttpRoute(...). - BREAKING: Zalo personal plugin (
@openclaw/zalouser) no longer uses external CLI transports; after upgrade re-login withopenclaw channels login --channel zalouser. - Secrets/SecretRef coverage expanded across user-supplied credential surfaces; unresolved refs fail fast on active surfaces.
- Tools: first-class
pdftool (native Anthropic/Google support + fallback extraction, with configurable limits). - CLI:
openclaw config validate(and--json) to validate config before gateway startup. - Telegram: streaming defaults to
partialfor new setups; DM preview streaming behavior updated. - Memory: embeddings via Ollama supported for memory search (
memorySearch.provider/fallback = "ollama"). - Tools/diffs plugin: PDF output support and rendering quality controls for diff artifacts.
Release Updates (v2026.3.1)
- Gateway: built-in container probe endpoints (
/healthz,/readyz, plus aliases/health,/ready) for Docker/Kubernetes. - CLI:
openclaw config fileprints the active config path (resolvesOPENCLAW_CONFIG_PATHor default). - Discord: thread-bound session lifecycle now supports inactivity (
idleHours) and hard max age (maxAgeHours), plus/session idleand/session max-age. - Telegram: per-DM
direct+ DM topics config surface (topic-aware policy, skills, system prompt, allowlists). - Nodes (Android): expanded node tool surface (camera/device/notifications/photos/contacts/calendar/motion).
- Tools: optional
diffsplugin tool for read-only diff views and PNG rendering.
Release Updates (v2026.2.23)
- Providers: first-class
kilocodeprovider support (auth, onboarding, implicit provider detection, and model defaults). - Tools/web_search: add provider
"kimi"(Moonshot) and correct the two-step$web_searchtool flow (echo tool results before synthesis). - Gateway: optional HSTS via
gateway.http.securityHeaders.strictTransportSecurityfor direct HTTPS deployments. - Sessions: hardened maintenance via
openclaw sessions cleanupwith disk-budget controls and safer transcript/archive cleanup. - Breaking: browser SSRF policy defaults changed and config key renamed (
browser.ssrfPolicy.allowPrivateNetwork->browser.ssrfPolicy.dangerouslyAllowPrivateNetwork); useopenclaw doctor --fixto migrate.
Architecture and Runtime Concepts
Agent Loop
- Agent loop is serialized per session (and optionally globally) to avoid tool/history races.
- Run lifecycle emits assistant/tool/lifecycle streams for observability.
- Wait timeout and runtime timeout are different controls.
System Prompt and Context
- System prompt is OpenClaw-composed per run (not provider default prompt).
- Prompt mode can be
full,minimal, ornonedepending on run context. - Context includes system prompt, transcript, tools/results, attachments, schemas.
- Bootstrap files are injected into context window and consume budget.
Workspace and Memory
- Workspace is default execution directory and memory surface, not a hard sandbox.
- Use sandbox settings when strict filesystem isolation is required.
- Memory is markdown-first: daily notes + curated durable memory.
- Compaction persists summary to transcript; pruning trims old tool results in-memory.
Messaging, Queueing, Presence
- Message processing uses dedupe, optional inbound debounce, queue modes, and channel-aware delivery.
- Queue/streaming/chunking behavior is policy-driven and tunable per channel.
- Presence is best-effort observability; stable
instanceIdis required to avoid duplicate entries.
Tools Governance
- Start with least-privilege profile, then explicitly allow required tools.
- Deny list overrides allow list.
- Treat
exec,sessions_*,gateway,nodesas high-impact surfaces. - Require explicit user consent for media-capture operations.
- Enable loop-detection when tools may form no-progress cycles.
Channels and Provider Strategy
- Start with fastest stable channel path (commonly Telegram) for baseline verification.
- Add WhatsApp and advanced channels only after pairing/allowlists are proven.
- Keep provider selection explicit via
provider/modeland avoid implicit model drift. - Isolate auth profiles per agent when separating work/personal contexts.
Nodes and Remote Execution
- Nodes are capability executors, not gateway replacements.
- Pair nodes explicitly and verify capabilities before invoking actions.
- Keep node exec approvals local to node host and audited.
- Use explicit node binding for deterministic remote execution targeting.
Security Baseline
- Assume prompt injection is always possible.
- Apply controls in this order: identity (pairing/allowlist) -> scope (tools/sandbox/mentions) -> model policy.
- Keep control UI in secure context (loopback/HTTPS); avoid insecure auth downgrades.
- Use strict filesystem permissions for config/state and redact sensitive logs.
Troubleshooting Ladder
openclaw statusopenclaw gateway statusopenclaw logs --followopenclaw doctoropenclaw channels status --probe
Common triage map:
- No replies -> pairing/allowlist/mention policy.
- Connect loop -> auth mode + endpoint + secure context.
- Startup fail -> mode/bind/auth/port conflict.
- Tool failure -> permissions/approvals/foreground constraints.
Concepts URLs Status (from left navigation)
- Extracted concepts are integrated directly into this skill.
- Some source URLs in docs navigation currently return 404 or empty content.
- Coverage for those pages is consolidated in
references/concepts.mdwith fallback guidance.
When to Use
- You need to design or operate an OpenClaw deployment.
- You need to connect channels, providers, and tools safely.
- You need a practical checklist for onboarding and gateway setup.
Core Operating Workflow
- Confirm topology and responsibilities from architecture notes.
- Choose channels/providers and required tools.
- Configure gateway access and remote connectivity.
- Validate onboarding flow and control UI accessibility.
- Run troubleshooting and hardening checklist.
Critical Prohibitions
- Do not copy large verbatim chunks from vendor docs into this skill.
- Do not invent defaults or hidden behavior without doc evidence.
- Do not weaken safety controls (pairing, allowlists, auth, sandbox) for convenience in production.
Links
Key docs pages: Architecture, Tools, Gateway
Weekly Installs
16
Repository
itechmeat/llm-codeGitHub Stars
9
First Seen
Feb 21, 2026
Security Audits
Installed on
codex16
github-copilot14
kimi-cli14
gemini-cli14
cursor14
opencode14