Install
openclaw skills install claw-update-runbookUse when updating OpenClaw or debugging an OpenClaw instance after an update. This skill acts as a structured update runbook with emphasis on gateway startup, service-manager state, plugin registry and install drift, bundled-vs-npm/clawhub plugin confusion, stale config carried across upgrades, channel health, task ledger corruption, and logs that explain why the updated system is slow, disconnected, or half-broken.
openclaw skills install claw-update-runbookUse this skill when an OpenClaw host was just updated, is about to be updated, or is behaving strangely after an update. It is a generic operator runbook, not a release-specific checklist.
This skill is meant to be installed as a folder, not copied as a single file. It expects references/failure-patterns.md to exist locally beside SKILL.md inside the same skill bundle.
The goal is not only to get it running, but to prove which layer is broken:
Establish the real starting state.
If you are connected over non-interactive SSH, do not assume the
login-shell PATH is available. First locate the binary with common install
paths such as a package-manager prefix and ~/.local/bin/openclaw, then
export the correct PATH for the audit session.
Check:
openclaw --versionopenclaw status --deepopenclaw doctor --non-interactive --no-workspace-suggestionsopenclaw channels status --deepopenclaw tasks auditVerify the gateway is actually managed correctly.
Look at service-manager state, running PID, and /health.
Derive the service label/name and gateway port from openclaw status --deep
and/or the service definition instead of guessing them.
Do not trust only one of:
It is common to have:
Separate bundled plugins from globally installed plugins. First inspect plugin health:
openclaw plugins doctoropenclaw plugins list --jsonopenclaw plugins inspect <id>Important rule:
codex, compare plugins inspect <id>
with plugins list --json; inspect can report a runtime as loaded while
raw plugin metadata still says disabled.Check for config carried across the upgrade that no longer validates. Pay attention to:
tools.web.search.providerplugins.allowplugins.entries.*openai/*, openai-codex/*, codex, and piIf doctor says a provider or plugin is unknown, inspect the actual config file and do not assume doctor --fix fully cleaned it.
Compare plugin install records to what exists on disk. Inspect:
~/.openclaw/plugins/installs.json~/.openclaw/npm/node_modules/@openclaw/...~/.openclaw/extensions/...Look for:
openclaw update --channel ...@latestdist/Inspect recent gateway logs before changing too much. Read:
~/.openclaw/logs/gateway.log~/.openclaw/logs/gateway.err.log/tmp/openclaw/openclaw-YYYY-MM-DD.logPrioritize recent startup lines and warnings involving:
~/.openclaw/service-env/*.env for token-line quote corruption — see Pattern #23 — before assuming the upstream credential was rotated)Audit runtime/task health after the upgrade. Check for:
A successful package update can still leave the system unhealthy if stale tasks block restarts or keep the audit red.
Prove the primary model route, not just overall agent success. Run a narrow direct agent smoke test with a fresh session id and inspect the returned metadata:
fallbackAttemptsTreat status: ok as insufficient if the primary model failed and a fallback provider completed the run.
Treat a clean plugins doctor as insufficient for runtime plugins until a
fresh direct agent run proves that the intended harness can load and execute.
Test at least one representative cron path. Check:
cron run behavior--expect-final actually waits for final completion on the current buildIf cron verification only proves enqueue, state that clearly in the handoff notes.
Re-run the narrowest fix, then verify again. Common fix sequence:
doctor, plugins doctor, status --deep, channels status --deep, and tasks auditUse this order when diagnosing post-update failures:
/healthopenclaw --versionopenclaw plugins doctoropenclaw doctoropenclaw channels status --deepopenclaw tasks auditStart with this file first.
Open references/failure-patterns.md when:
doctor or plugins doctor points to a known-looking regressionchannels status or logs disagree with the apparent service healthUse the reference file for symptom matching and concrete examples after the main workflow has narrowed the likely failure area.
Do not assume a broken plugin means "plugin missing."
There are three common cases:
A channel plugin is a good example of the second case: a host can upgrade correctly while still loading an older globally installed plugin package.
If the feature is not bundled, check npm and ClawHub before rewriting config.
Prefer the smallest fix that makes state consistent again:
node_modulesDo not stop at "service is up." A good finish means:
If the upgrade exposed an OpenClaw bug rather than local drift, collect enough information for the next operator or project/support contact. Do not assume the user has any particular external account or wants a public report created.
fallbackAttemptsdoctor/plugins doctor warning textSanitize handoff notes before sharing externally:
<state>, <global-openclaw>, and ~/.openclawFor concrete regression patterns and example symptoms, read references/failure-patterns.md.
When another operator or agent learns something new from a different OpenClaw host:
references/failure-patterns.mdIf a new finding is host-specific or uncertain, add it as a new failure pattern with:
Do not silently erase older patterns just because the current host did not hit them.