Claw Seatbelt

ReviewAudited by ClawScan on May 10, 2026.

Overview

This appears to be a simple local rollback helper, but it can overwrite your OpenClaw config and force-restart the Gateway more broadly than the description promises.

Install only if you are comfortable with a script changing ~/.openclaw/openclaw.json and force-restarting OpenClaw Gateway. Use it manually in a confirmed config-change/backup window, verify the backup first, and avoid background scheduling until the trigger, timing, and confirmation safeguards match the documentation.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If this runs at the wrong time, or if the status check fails for a transient reason, your Gateway config could be reverted and the Gateway restarted unexpectedly.

Why it was flagged

Any invocation that sees the Gateway as non-active immediately overwrites the active OpenClaw config and force-restarts the Gateway, with no confirmation, backup-script-context check, or validation that the outage was caused by the current config change.

Skill content
if ! openclaw gateway status --json | grep -q ...; then ... cp "$LATEST_BACKUP" "$CONFIG_FILE" ... openclaw gateway restart --force
Recommendation

Require explicit user approval before rollback, verify that the script is running in a narrow post-config-change window, validate the backup, and avoid --force unless the user confirms.

What this means

Users may rely on safety limits that are not actually enforced by the included script.

Why it was flagged

The documentation promises backup-script-only activation and a 10-second recovery window, but the provided script contains no backup-script gate and performs rollback immediately after a failed status check.

Skill content
**按需保护**:仅在运行备份脚本时触发 ... **10秒无敌险**:修改配置后若 Gateway 无法在 10 秒内恢复,自动回退到最新备份并重启。
Recommendation

Either update the implementation to enforce the documented trigger and 10-second wait, or update the documentation to clearly state that the script rolls back immediately whenever it is invoked and the Gateway is not active.

What this means

A stale, incorrect, or otherwise bad backup can become the active Gateway config and affect the whole OpenClaw Gateway session.

Why it was flagged

The script trusts the newest matching backup file solely by timestamp/name and makes it the live Gateway configuration before restarting.

Skill content
LATEST_BACKUP=$(ls -t "$BACKUP_DIR"/openclaw-*.json 2>/dev/null | head -n 1) ... cp "$LATEST_BACKUP" "$CONFIG_FILE"
Recommendation

Validate backup integrity and contents, let the user select or confirm the backup, and keep a clear rollback path if the restored backup is also bad.

What this means

You have less assurance about provenance and compatibility, and the script may fail or behave unexpectedly if the OpenClaw CLI is unavailable or different from expected.

Why it was flagged

The skill ships a shell script that depends on local OpenClaw CLI behavior, but provenance is limited and runtime binaries are not declared. This is a verification note, not evidence of hidden malicious code.

Skill content
Source: unknown; Homepage: none; Required binaries (all must exist): none
Recommendation

Verify the included script before use, confirm the publisher/source, and declare required binaries such as the OpenClaw CLI and shell utilities.