auto-rollback
v1.2.0-alpha.2Timed rollback safety net for edits to ~/.openclaw/openclaw.json on macOS. Use when changing Gateway config, restarting Gateway after config edits, or needin...
⭐ 0· 529·5 current·5 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the actual behavior: the script backs up ~/.openclaw/openclaw.json, writes a state file and log, creates a launchd plist and a one-off rollback script, and attempts a Gateway restart via the local openclaw CLI. Required binaries (bash, launchctl, jq, curl, plutil) are appropriate for these operations.
Instruction Scope
SKILL.md limits runtime actions to backing up, scheduling/cancelling a rollback, checking local Gateway health via localhost:18789, and optionally integrating a BOOT.md snippet to cancel the job. The instructions do not read or transmit unrelated system data or call external endpoints beyond localhost.
Install Mechanism
No install spec (instruction-only) and the included script runs from the user's workspace. Nothing is downloaded or extracted from external URLs. The script writes files only under $HOME/.openclaw and generates a user-scoped launchd plist; this is expected for the described purpose.
Credentials
The skill requests no credentials or environment secrets. It relies on common local utilities and the openclaw binary (reasonably required to restart the Gateway). It does not ask for unrelated service tokens or global config paths.
Persistence & Privilege
The skill creates files under ~/.openclaw and installs a user launchd job (ai.openclaw.rollback) which will run under the user's account at the scheduled time — this is necessary for its function. always:false and normal model invocation mean it won't be auto-added everywhere; nevertheless, it creates persistent state (plists and scripts) in the user's home while a rollback is pending.
Assessment
This skill appears to do what it claims: make a timestamped backup of ~/.openclaw/openclaw.json, schedule a user-scoped launchd job to restore it after ~10 minutes if the Gateway stays unhealthy, and optionally cancel the rollback from BOOT.md on a healthy startup. Before installing/running: (1) inspect the included auto-rollback.sh yourself (it will write files under $HOME/.openclaw and create a launchd plist and executable in that directory), (2) confirm you have the openclaw CLI available so the script can restart the Gateway as intended, (3) be aware the job runs as your user via launchctl (not root) and will execute the generated rollback script if triggered, and (4) if you keep this in automated workflows, ensure agents follow the expected 'start' / 'cancel' sequence so you don't get unexpected rollbacks. If you want extra caution, run the script in a test environment or manually verify the created plist and rollback script before loading it into launchd.Like a lobster shell, security has layers — review code before you run it.
latestvk9790ab5r45s7ext5q0f5zpq7984wsnb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🛡️ Clawdis
OSmacOS
Binsbash, launchctl, jq, curl, plutil
