OpenClaw Upgrade Standard
v1.0.0Safe OpenClaw upgrade procedure with backup, doctor fix, service migration, rollback, and post-upgrade testing. Prevents silent failures from Dashboard upgra...
⭐ 0· 70·0 current·0 all-time
by@gjoham
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (safe OpenClaw upgrade with backup, doctor fix, service migration, rollback and testing) matches the instructions: backing up ~/.openclaw, running openclaw doctor, npm global upgrade/rollback, fixing the systemd user service, restarting and testing. Required tools (npm, systemctl, journalctl, sed, cp) are reasonable for the stated task.
Instruction Scope
All runtime steps stay within upgrade/rollback scope: they read and back up OpenClaw config/credentials, check/repair config, modify the OpenClaw systemd user service if entrypoint changed, restart it, and collect logs if needed. The instructions do not request unrelated files, network exfiltration, or external endpoints beyond the official GitHub releases page and filing issues on the OpenClaw repo.
Install Mechanism
This is an instruction-only skill with no install spec or bundled code. That lowers risk — nothing is downloaded or written by the skill itself beyond user-run commands described in the doc.
Credentials
No environment variables or external credentials are required by the skill, which is proportional. However the backup step explicitly copies credential and agents directories into a backup folder; while appropriate for rollback, users should understand these backups contain sensitive secrets and protect/encrypt the backup location.
Persistence & Privilege
always:false and no install means no persistent privileged presence. The described actions modify only user-level OpenClaw files and the systemd user service (expected for an upgrade). No cross-skill or system-wide configuration changes beyond the user's OpenClaw service are requested.
Assessment
This procedure appears legitimate and coherent, but take these precautions before following it:
- Inspect and, if needed, adjust the BACKUP_DIR path. Backups include credentials and should be stored securely (restrict filesystem permissions and consider encrypting the backup archive).
- Confirm your npm global prefix matches the script's assumed path (~/.npm-global); adapt the entrypoint checks if your npm global modules are located elsewhere.
- Run the commands as the same user who runs the OpenClaw user service (systemctl --user) to avoid permission mismatches.
- Review the sed replacement step before running it (make a copy of the service file first) to avoid corrupting the unit file.
- Test the procedure in a staging environment if possible before applying in production.
If you want extra assurance, provide the exact environment (OS, npm prefix) or a copy of your openclaw-gateway.service and I can point out any adjustments needed. Like a lobster shell, security has layers — review code before you run it.
devopsvk975s5zvk3rbzmy4ykwyrjbass83f5fhlatestvk975s5zvk3rbzmy4ykwyrjbass83f5fhmaintenancevk975s5zvk3rbzmy4ykwyrjbass83f5fhsafetyvk975s5zvk3rbzmy4ykwyrjbass83f5fhupgradevk975s5zvk3rbzmy4ykwyrjbass83f5fh
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
⬆️ Clawdis
