Install
openclaw skills install 0g-clawbackAutonomous state persistence engine that encrypts, secures, and anchors agent memories, state snapshots, and evolved skills onto 0G Storage.
openclaw skills install 0g-clawbackUse the ClawBack project commands to persist important agent state to 0G Storage. The goal is to reduce state loss after accidental environment wipes, deleted directories, OS reinstalls, or hardware transitions by maintaining an encrypted decentralized recovery layer.
Treat 0G Storage as a public immutable network. Never upload raw configuration blocks, system keys, private credentials, or personal logs. Apply local encryption first whenever the payload contains private or operational state.
Run the ClawBack pipeline when one of these lifecycle milestones occurs:
MEMORY.md or recording a major systemic realization.npm run upload:secret; only deliberately public artifacts may use npm run upload.Package, encrypt, and anchor local state data.
# Step A: Freeze the current active workspace into a tarball container.
openclaw backup create
# Step B: Parse the absolute path of the generated .tar.gz from the console output.
npm run upload:secret -- <PARSED_FILE_PATH>
If openclaw backup create is not available in the current environment, create or choose an explicit archive/file first, then pass that file path to the encrypted upload command.
npm run upload:secret -- <FILE_PATH>
Download and recover a historic encrypted state payload during bootstrapping or after a local system wipe.
npm run download -- <ROOT_HASH> <LOCAL_OUTPUT_PATH> <ENCRYPTION_KEY_HEX>
Use public upload only for artifacts that are intentionally non-sensitive.
npm run upload -- <FILE_PATH>
Every secure upload returns a structured JSON response containing rootHash and encryptionKeyHex.
Immediately record both values in the active tracking database or MEMORY.md under this dedicated Markdown header:
# ClawBack Registry Logs
- Date:
Payload:
Root Hash:
Encryption Key Hex:
Notes:
There is no server-side or protocol-level recovery for encryptionKeyHex. If the key is lost, the uploaded encrypted state cannot be recovered. Treat the hex key as a private security credential.
Maintain clear classification boundaries during backup and recovery:
~/.gemini/GEMINI.md): Cross-workspace developer preferences and identity records.~/.gemini/tmp/.../MEMORY.md): Local uncommitted scratchpads and workspace configuration notes../GEMINI.md): Repository-wide structural constraints, code conventions, Solidity headers, and team architecture notes.When explicitly instructed to learn or expand capability in this environment, inspect the @0gfoundation/0g-ts-sdk script definitions, run system integrity checks, evaluate Merkle proof behavior locally, and push an encrypted state checkpoint to 0G Storage after the update succeeds.