Agent Health Diagnostics

v1.0.1

Diagnose and fix the 4 most common OpenClaw agent failures — heartbeat spam, API rate limit cascades, channel death loops, and memory/embedding errors. Battl...

0· 103·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for agenthyjack/agent-health-diagnostics.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Agent Health Diagnostics" (agenthyjack/agent-health-diagnostics) from ClawHub.
Skill page: https://clawhub.ai/agenthyjack/agent-health-diagnostics
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install agent-health-diagnostics

ClawHub CLI

Package manager switcher

npx clawhub@latest install agent-health-diagnostics
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the instructions: the SKILL.md contains direct diagnostic commands (journalctl, systemctl, openclaw CLI, nc, editing ~/.openclaw/openclaw.json) that are exactly what an on-host OpenClaw operator would need. No unrelated credentials, external endpoints, or unrelated binaries are requested.
Instruction Scope
Instructions stay within the scope of diagnosing and fixing agent issues: they read the OpenClaw config, check service logs, test network connectivity, and advise editing config and restarting gateways. These actions require host-level access (journalctl/systemctl), which is appropriate for an ops troubleshooting skill. Minor inconsistency: some example backup commands use a full path (~/.openclaw/openclaw.json) while a Golden Rule example uses a relative path (`cp openclaw.json openclaw.json.bak`) — this is a small usability note, not a security mismatch.
Install Mechanism
There is no install spec and no code files to write to disk. This instruction-only format minimizes install risk; nothing is downloaded or installed.
Credentials
No environment variables, credentials, or config paths outside the agent's own config (~/.openclaw/openclaw.json) are requested. The commands reference system logs and service control which are expected for this purpose and do not request unrelated secrets.
Persistence & Privilege
Skill is not always-enabled and does not request persistent presence or elevated platform privileges. It does instruct operators to edit agent config and restart services (expected for diagnostics). Note: running the commands requires appropriate host permissions (may need sudo), so grant execution carefully.
Assessment
This skill is a coherent, instruction-only troubleshooting playbook for OpenClaw agents. Before using it: (1) review and understand each shell command (journalctl/systemctl/nc) because they operate on the host and may require sudo; (2) back up your actual config file (use the full ~/.openclaw/openclaw.json path to avoid mistakes) and, if possible, test changes on a non-production agent first; (3) prefer interactive/manual runs rather than granting autonomous execution to the agent unless you trust it fully; (4) if you need more confidence, inspect the linked Collective Skills repository or run the listed commands yourself to validate effects. There are no signs of secret exfiltration or unexpected external endpoints in the skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk9780cyh6v14c2hgsmexv4dpj18465ft
103downloads
0stars
2versions
Updated 3w ago
v1.0.1
MIT-0

Agent Health Diagnostics

Scripts available in the Collective Skills repo

Overview

When an OpenClaw agent misbehaves — spamming messages, going dark, burning API credits, or looping on dead channels — this skill provides the diagnostic playbook. Covers the 4 most common failure modes with exact commands to diagnose and fix each one.

Battle-tested across a 6-agent deployment spanning 3 hosts (Windows + Linux + Proxmox).

When to Use This Skill

Use when you observe any of these symptoms:

  • Agent sending repeated heartbeat/status messages to Telegram/Discord/etc.
  • Agent goes silent despite gateway showing "active"
  • Logs show 429 Too many tokens or rate_limit errors
  • Channel connection loops: auto-restart attempt 1/10, 2/10, etc.
  • Memory search errors: input length exceeds context length
  • Gateway says "active" but agent doesn't respond to messages

The 4 Failure Modes

1. Heartbeat Spam

Symptom: Agent sends repeated messages every N minutes. Root cause: Heartbeat interval too low (10m = 144 messages/day) + verbose prompt that always generates output instead of HEARTBEAT_OK. Quick fix:

# Check interval
grep -A5 heartbeat ~/.openclaw/openclaw.json

# Fix: set to 30m minimum, simplify prompt to checklist + HEARTBEAT_OK default
# Then restart gateway
openclaw gateway restart

Prevention: Never set heartbeat below 20 minutes. Heartbeat prompts should CHECK things, not CREATE things.

2. API Rate Limit Cascade

Symptom: All models fail, agent goes dark. Root cause: Heartbeat + N crons = (N+1) API calls per interval. Exceeds provider TPM limit → all fallbacks exhausted simultaneously. Quick fix:

# Check for rate limits
journalctl -u <service> --since '1h ago' | grep '429\|rate_limit'

# Count your crons (each burns tokens)
openclaw cron list

# Fix: reduce heartbeat to 30-60m, disable non-essential crons, stagger schedules

Prevention: Calculate token budget before adding crons. Each run ≈ 2K-10K tokens. Route heartbeats to cheap/local models.

3. Channel Death Loop

Symptom: Logs show repeated auto-restart attempt N/10 for IRC/Discord/etc. Root cause: Target server unreachable → health monitor restarts → fails again → loop. Each restart may trigger model calls, burning API tokens. Quick fix:

# Check for loops
journalctl -u <service> --since '1h ago' | grep 'auto-restart\|timed out'

# Test connectivity
nc -zv <target-ip> <target-port> -w 5

# Fix: disable the broken channel in openclaw.json
# channels.<name>.enabled = false
openclaw gateway restart

Prevention: Test connectivity BEFORE enabling channels. Disable channels you can't reach.

4. Memory/Embedding Overflow

Symptom: memory sync failed or input length exceeds context length errors. Root cause: File too large for embedding model's context window (mxbai-embed-large = 8K tokens). Quick fix: Archive old sections of large files (MEMORY.md → memory/archive/). Keep active files under 8K tokens. Prevention: Don't let MEMORY.md grow unbounded. Archive quarterly.

Remote Diagnostic Quick Reference

WhatCommand
Service statussystemctl is-active <service>
Recent logsjournalctl -u <service> --since '1h ago' --no-pager | tail -40
Live tailjournalctl -u <service> -f
Rate limitsjournalctl -u <service> --since '1h ago' | grep '429'
Cron listopenclaw cron list
Port testnc -zv <ip> <port> -w 5
Config backupcp ~/.openclaw/openclaw.json ~/.openclaw/openclaw.json.bak

Golden Rules

  1. Always back up config before editing. cp openclaw.json openclaw.json.bak
  2. Always restart gateway after config changes. Hot reload doesn't catch everything.
  3. Check logs before guessing. journalctl tells you what's wrong 90% of the time.
  4. Calculate your API budget. Heartbeat freq × (crons + 1) × avg tokens = burn rate.
  5. Disable what you can't reach. Dead channels create loops that waste resources.
  6. "Configured" ≠ "working." Verify with actual output after every change.

Comments

Loading comments...