OpenClaw Safe Update
v1.0.1Safely verify and apply OpenClaw upgrades with isolated sidecar checks. Use when asked to update OpenClaw, verify a target version before upgrading, avoid gl...
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description (safe, isolated verify-first upgrades) aligns with required binaries (openclaw, node, npm, curl, bash), the included script, and the platform reference docs. All requested tools are expected for performing an npm-based sidecar verification and global npm install when applying.
Instruction Scope
SKILL.md instructs the agent to run the bundled script and to default to verify-only, inspect logs on failure, and only apply on explicit confirmation. The script only touches ~/.openclaw (versions and logs), uses npm/node to fetch and run the candidate package locally, probes a loopback port, and does not read unrelated system files or exfiltrate data. Behavior stays within the described upgrade/verification scope.
Install Mechanism
No external install spec (instruction-only with included script). The script uses npm to download package versions from the public npm registry and then executes the candidate's entrypoint with node. This is coherent for verifying a package but means the skill will download and execute third-party code from npm into the user's home directory — expected for the task but intrinsically higher-risk than pure configuration actions.
Credentials
The skill declares no required credentials and only uses common env overrides (OPENCLAW_VERSIONS_DIR, LOG_DIR, SIDECAR_*). There are no requests for unrelated secrets or system credentials. The need for sudo on global npm installs is noted in docs and is a standard platform permission issue, not a hidden credential request.
Persistence & Privilege
The skill does not request always:true or other elevated platform privileges. It will create files under ~/.openclaw (candidate installs and logs) and may perform global npm install when run with --apply (which can require elevated permissions). The script itself defaults to verify-only and only applies when given --apply; however the agent could invoke the script with --apply if misused — the SKILL.md relies on the agent to ask for explicit user confirmation before applying.
Assessment
This skill appears to do what it says: it downloads a candidate OpenClaw version into ~/.openclaw/versions, runs that candidate in an isolated sidecar on localhost to verify startup, and only performs a global npm -g install when explicitly asked. Before installing: 1) Understand that the script will download and execute code from the public npm registry (this is necessary for verifying the real package but is an execution risk). 2) Review the log at ~/.openclaw/logs/openclaw-sidecar-verify.log if verification fails. 3) Be aware that applying the upgrade runs npm install -g and may require sudo — only allow apply with explicit, informed consent. 4) If you need stronger isolation, run the script inside a disposable VM/container or audit the specific package version you plan to install. If you want higher assurance, request cryptographic signatures or a vetted release channel instead of arbitrary npm versions.Like a lobster shell, security has layers — review code before you run it.
Runtime requirements
🛡️ Clawdis
Binsopenclaw, node, npm, curl, bash
latest
OpenClaw Safe Update
Run production-safe OpenClaw upgrades with isolation-first defaults.
Workflow
- Use bundled script:
scripts/openclaw-safe-update.sh. - Run verify-only first (default):
bash scripts/openclaw-safe-update.sh- Optional target pin:
--target <version> - Port is auto-selected from free ports starting at
18000.
- If verify fails, inspect log path printed by script and report the root cause.
- If verify passes, ask whether to apply.
- Apply only on explicit confirmation:
bash scripts/openclaw-safe-update.sh --apply
Platform references
Detect OS first, then read exactly one platform guide:
- macOS (
uname=Darwin) →references/macos.md - Linux (
uname=Linux) →references/linux.md
Rules
- Default to verify-only; never apply without explicit user consent.
- Keep candidate install isolated (
npm --prefix ~/.openclaw/versions/<version>). - Keep sidecar isolated (
--profile sidecar-verify, dedicated--port). - Preserve logs on failure and include path in status updates.
- If verify fails, do not mutate global install.
Comments
Loading comments...
