OpenClaw Sacred Rules

ReviewAudited by ClawScan on May 10, 2026.

Overview

This is mostly a coherent OpenClaw recovery helper, but its auth reset and backup scripts touch sensitive auth files and include unsafe path and restore behavior that should be reviewed before use.

Review the scripts before running them. In particular, fix reset_cooldowns.sh so it uses your actual auth profile path and only resets the intended fields, and treat ~/openclaw-backups as sensitive because it can contain API keys and auth data.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running this script could fail after creating a backup, modify the wrong local auth profile if that path exists, or reset provider safeguards more broadly than the user expected.

Why it was flagged

The script checks and backs up the current user's auth file, but the Python block edits a fixed /Users/admin path and clears every provider's cooldown/error state rather than only expired cooldowns.

Skill content
AUTH_FILE="$HOME/.openclaw/agents/main/agent/auth-profiles.json" ... auth_file = '/Users/admin/.openclaw/agents/main/agent/auth-profiles.json' ... # Clear all cooldowns and error states
Recommendation

Do not run this script as-is. Pass the checked $AUTH_FILE into Python, display and confirm the target path, and limit changes to the intended expired cooldown fields.

What this means

The backup may contain sensitive credentials; if the backup folder is shared, synced, or left with weak permissions, those credentials could be exposed locally.

Why it was flagged

The backup script intentionally copies local environment and auth profile files, which may contain gateway passwords, API keys, tokens, or account state, into a persistent backup directory.

Skill content
FILES=( "$HOME/.openclaw/openclaw.json" "$HOME/.openclaw/.env" "$HOME/.openclaw/agents/main/agent/auth-profiles.json" ) ... cp "$file" "$BACKUP_DIR/"
Recommendation

Protect backup directories with restrictive permissions, avoid sharing or syncing them, encrypt them if possible, and delete old backups when no longer needed.

ConcernHigh Confidence
ASI08: Cascading Failures
What this means

A user following the restore instruction could misplace auth files, fail to restore the system correctly, or copy sensitive files into unintended locations during an outage.

Why it was flagged

The script flattens files from different original directories into one backup folder, then suggests restoring everything to ~/.openclaw/, which does not match the nested auth-profiles.json path or the optional LaunchAgents path.

Skill content
cp "$file" "$BACKUP_DIR/" ... echo "To restore: cp $BACKUP_DIR/* ~/.openclaw/"
Recommendation

Preserve relative paths in the backup or provide explicit per-file restore commands for openclaw.json, .env, auth-profiles.json, and any LaunchAgent file.

What this means

Install-time metadata may not warn users that using the skill involves running local bash/Python scripts against OpenClaw configuration and auth files.

Why it was flagged

The artifacts include executable helper scripts, but the registry metadata does not declare their runtime dependencies or local path expectations, and no upstream homepage/source is provided.

Skill content
Source: unknown; Homepage: none ... Required binaries: none ... No install spec — this is an instruction-only skill ... Code file presence 4 code file(s)
Recommendation

Declare required binaries such as bash, python3, and openclaw; declare expected ~/.openclaw paths; and provide verifiable source/provenance information.