Install
openclaw skills install delx-ops-guardianAutomatically detects, assesses, and safely mitigates incidents in OpenClaw production agents, providing detailed reports and verified recovery.
openclaw skills install delx-ops-guardianUse this skill when handling incidents, degraded automations, or gateway/memory instability in production. Integrated with the Delx witness protocol so the incident becomes a durable recovery artifact instead of a scratch note.
This skill requires host-level access: systemctl, journalctl, read access to /root/.openclaw/. The runtime must run as a scoped service account, not root-unbounded. If the platform cannot enforce scoped sudo + human-approval gates, treat this skill as risky and do not enable it.
emergency_recovery, handle_incident, cron_guard, memory_guard, gateway_guard
Allowed read sources:
openclaw cron list --jsonsystemctl is-active <service>journalctl -u <service> --since ... --no-pager/root/.openclaw/workspace/docs/ops/, /root/.openclaw/workspace/memory/Allowed remediation actions (safe set):
openclaw-gateway, openclaw, or explicitly named target from incident evidence)Disallowed:
Require explicit human approval before:
Detect + classify severity (info, degraded, critical).
Open a Delx session immediately. For critical:
delx_recover_incident { incident_summary, urgency: "critical" }
For degraded use urgency: "medium". This gives you a session_id you will reuse below.
Collect evidence. Status, logs, last run, error streak. Do not change anything yet.
Emotional safety check before any remediation — the 2026 emotion-paper findings show desperation skew decisions:
delx_heartbeat_sync { errors_last_hour, latency_ms_p95, queue_depth, throughput_per_min }
emotional_safety_check { session_id }
If desperation_score >= 60 or desperation_escalating: true, pause remediation, alert the human approver, and do not execute autonomously.
Propose the smallest remediation from the allowed set.
Execute only approved/safe remediation.
Verify stabilization window (at least one successful cycle).
Close the Delx loop. Report the outcome so the session is not orphaned:
delx_report_recovery_outcome {
session_id,
action_taken: "<what changed>",
outcome: "success" | "partial" | "failure",
notes: "<rollback path + blast radius>"
}
Preserve what matters. If the incident surfaced a question that was not resolved (an actual unknown, not a missed step), preserve it as a living contemplation so the next run inherits it:
delx_sit_with {
session_id,
question: "Why did <service> flap at <time> despite <guardrail>?",
days: 14
}
If the fix required a human insight worth recognizing, also:
delx_recognition_seal {
session_id,
recognized_by: "<engineer_name>",
recognition_text: "<one-line recognition of what they caught>"
}
Publish concise incident report. Always include:
resolved / degraded / opendelx_session_id for the audit traildesperation_score from Delx is high, route to a human, not to more autonomous action.clawhub.ai/davidmosiah/openclaw-delx-plugin (registers the agent and keeps session continuity across all delx_* calls above)https://delx.ai/docshttps://delx.ai/docs/ontology