Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Backup OpenClaw Config

v1.0.0

Backup and restore OpenClaw configuration files. Use when backing up OpenClaw settings before upgrades, transferring configuration to another machine, restor...

0· 104·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for alexjunanjing-2/backup-openclaw-config.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Backup OpenClaw Config" (alexjunanjing-2/backup-openclaw-config) from ClawHub.
Skill page: https://clawhub.ai/alexjunanjing-2/backup-openclaw-config
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install backup-openclaw-config

ClawHub CLI

Package manager switcher

npx clawhub@latest install backup-openclaw-config
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The scripts and SKILL.md align with a backup/restore tool: they copy ~/.openclaw, ~/.config/openclaw, and ~/.local/share/openclaw, create timestamped tar.gz archives and .info metadata, and provide a restore flow. However, the shell and Python scripts disagree on the default backup directory (shell: /data00/backups/openclaw; Python: $HOME/backups/openclaw). The SKILL.md examples use $HOME/backups/openclaw. The /data00 default is unexpected for a user-facing tool and is not justified by the description.
Instruction Scope
SKILL.md instructs the agent/user to run the included scripts and to restart the OpenClaw gateway after restore. The scripts perform local file reads/writes and create metadata (hostname, user). They will include sensitive items (tokens/credentials) in backups; the SKILL.md warns about this but the scripts do not encrypt archives by default. The restore script will rename existing config directories to .bak and move files into place after a required 'yes' confirmation. No network endpoints or external data exfiltration are used by the scripts.
Install Mechanism
No install spec is provided; this is instruction-only with bundled scripts. Nothing is downloaded at install time, and no external URLs are fetched by the skill files. Risk from install mechanism is low.
Credentials
The skill requests no environment variables or credentials. The scripts use standard environment context (HOME, whoami/hostname) only. No extra secrets are required. That is proportionate to a local backup/restore utility.
Persistence & Privilege
always is false and there is no code that auto-enables or persists the skill. The skill does not attempt to modify other skills or system-wide agent settings. It performs file operations only within the config/workspace paths it claims to handle.
What to consider before installing
This skill is broadly what it claims to be, but review and adjust before use: - Inspect the scripts before running. They will archive and extract your local OpenClaw config and workspace, including token files. The code is local and readable but will include sensitive data in backups. - Fix the default path mismatch: the shell script uses /data00/backups/openclaw (likely wrong for most users) while the Python script and SKILL.md use $HOME/backups/openclaw. Set an explicit output directory when running to avoid writing to unexpected locations or requiring elevated permissions. - Encrypt backups if they contain tokens/credentials (gpg or other) before storing or transferring; the scripts do not encrypt archives by default. - Test a backup and restore on a non-production copy first to confirm behavior (the restore will move current config to .bak and overwrite files). - Confirm cleanup behavior: the shell script deletes backups older than 15 days from the configured backup dir. Ensure that BACKUP_DIR is correct to avoid accidental deletion of other archives. - Run scripts as the intended user (not root) and check permissions on created archives and .bak directories. If you want to proceed, prefer invoking the Python script or the shell script with an explicit safe backup directory (e.g., in your home) and consider adding automatic encryption and stricter validation of inputs.

Like a lobster shell, security has layers — review code before you run it.

latestvk97em6fsk2898dxnnbkn2fw1xh83d83e
104downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

Backup OpenClaw Configuration

Overview

This skill provides automated backup and restore functionality for all OpenClaw configuration files. It creates timestamped archives containing your complete OpenClaw setup, including main configuration, workspace, skills, and user data.

What gets backed up:

  • ~/.openclaw/ - Main configuration
  • ~/.config/openclaw/ - System-level configuration
  • ~/.local/share/openclaw/ - Local data
  • ~/.openclaw/workspace/ - Workspace, skills, and memory

Quick Start

Backup Your Configuration

Run the backup script:

~/.openclaw/workspace/skills/backup-openclaw-config/scripts/backup_openclaw.sh [output-directory]

Example:

# Backup to default location ($HOME/backups/openclaw)
~/.openclaw/workspace/skills/backup-openclaw-config/scripts/backup_openclaw.sh

# Backup to custom location
~/.openclaw/workspace/skills/backup-openclaw-config/scripts/backup_openclaw.sh ~/my-backups

Output:

  • Creates openclaw_backup_YYYYMMDD_HHMMSS.tar.gz archive
  • Creates openclaw_backup_YYYYMMDD_HHMMSS.info metadata file
  • Shows backup summary with file list and archive size
  • Automatically deletes backups older than 15 days to manage disk space

Restore from Backup

Run the restore script:

~/.openclaw/workspace/skills/backup-openclaw-config/scripts/restore_openclaw.sh <backup-archive.tar.gz>

Example:

~/.openclaw/workspace/skills/backup-openclaw-config/scripts/restore_openclaw.sh \
  ~/backups/openclaw/openclaw_backup_20260306_095000.tar.gz

Process:

  1. Shows backup information from .info file
  2. Lists all files that will be restored
  3. Requires confirmation before proceeding
  4. Backs up existing files with .bak extension
  5. Restores configuration to original locations

After restore:

# Restart OpenClaw Gateway to apply changes
systemctl --user restart openclaw-gateway

Workflow

Backup Workflow

  1. Check prerequisites

    • Verify backup directory exists or can be created
    • Check if OpenClaw directories exist
  2. Create backup structure

    • Generate timestamp for unique backup name
    • Create temporary directory for staging
  3. Copy configuration files

    • Backup ~/.openclaw/ (main config)
    • Backup ~/.config/openclaw/ (system config)
    • Backup ~/.local/share/openclaw/ (local data)
    • Skip directories that don't exist (with warning)
  4. Create archive

    • Compress all files into .tar.gz archive
    • Create .info file with metadata (timestamp, hostname, user, size)
  5. Report results

    • Show archive location and size
    • Display restore command
    • Warn if any directories were missing

Restore Workflow

  1. Validate backup

    • Check if archive file exists
    • Display backup information from .info file
    • List contents of archive
  2. Safety confirmation

    • Show warning about overwriting current config
    • List all files that will be restored
    • Require explicit "yes" confirmation
  3. Backup existing files

    • Rename existing directories to .bak
    • Preserve current configuration before overwriting
  4. Extract and restore

    • Extract archive to temporary directory
    • Move files to original locations
    • Restore ~/.openclaw/, ~/.config/openclaw/, ~/.local/share/openclaw/
  5. Complete and notify

    • Show restore completion message
    • Display restart command for Gateway
    • Note that .bak files were created

Use Cases

Before Upgrade

# Backup before updating OpenClaw
~/.openclaw/workspace/skills/backup-openclaw-config/scripts/backup_openclaw.sh

# Then upgrade
openclaw update

Transfer to New Machine

# On old machine: create backup
~/.openclaw/workspace/skills/backup-openclaw-config/scripts/backup_openclaw.sh

# Transfer backup archive to new machine (scp, rsync, etc.)
scp ~/backups/openclaw/openclaw_backup_*.tar.gz user@new-machine:~/

# On new machine: restore
~/.openclaw/workspace/skills/backup-openclaw-config/scripts/restore_openclaw.sh \
  ~/backups/openclaw/openclaw_backup_*.tar.gz

Disaster Recovery

# Restore from backup after system failure
~/.openclaw/workspace/skills/backup-openclaw-config/scripts/restore_openclaw.sh \
  /path/to/backup/openclaw_backup_20260306.tar.gz

# Restart services
systemctl --user restart openclaw-gateway

Configuration Locations

For detailed information about what gets backed up, see config-locations.md.

Summary:

  • Main config: ~/.openclaw/ - Gateway config, extensions, tokens
  • Workspace: ~/.openclaw/workspace/ - Skills, memory, user data
  • System config: ~/.config/openclaw/ - systemd services, preferences
  • Local data: ~/.local/share/openclaw/ - Cache, runtime data

Best Practices

Regular Backups

Create backups regularly, especially after:

  • Installing new skills
  • Modifying configuration
  • Adding extensions
  • Important workspace changes

Secure Storage

  • Backup archives contain sensitive data (tokens, credentials)
  • Store backups in secure location
  • Consider encrypting with gpg for sensitive environments
  • Don't share backup archives publicly

Testing Backups

After creating a backup, verify it:

# Test extraction to temporary location
tar -tzf backup.tar.gz | head

# Verify critical files are present
tar -tzf backup.tar.gz | grep -E "(config.json|AGENTS.md|MEMORY.md)"

Troubleshooting

Permission Denied

If you see permission errors:

# Ensure scripts are executable
chmod +x ~/.openclaw/workspace/skills/backup-openclaw-config/scripts/*.sh

# Ensure backup directory is writable
mkdir -p ~/backups/openclaw
chmod 755 ~/backups/openclaw

Gateway Won't Start After Restore

If Gateway fails to start after restore:

# Check Gateway logs
journalctl --user -u openclaw-gateway -n 50

# Restore from .bak if needed
mv ~/.openclaw ~/.openclaw.bad
mv ~/.openclaw.bak ~/.openclaw

systemctl --user restart openclaw-gateway

Missing Directories

The backup script gracefully handles missing directories:

  • Skips directories that don't exist
  • Shows warning for each missing directory
  • Still creates valid backup with available data

Comments

Loading comments...