ClawDNA -- Identity Backup & Sync

v1.0.1

CLI tool to version, snapshot, and sync your OpenClaw agent identity files, ensuring backup and preventing data loss or identity drift.

0· 153·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for gitpcl/clawco-clawdna.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "ClawDNA -- Identity Backup & Sync" (gitpcl/clawco-clawdna) from ClawHub.
Skill page: https://clawhub.ai/gitpcl/clawco-clawdna
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install clawco-clawdna

ClawHub CLI

Package manager switcher

npx clawhub@latest install clawco-clawdna
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (identity backup & sync) align with the instructions: the SKILL.md tells the agent to suggest and run clawdna CLI commands, watch identity files, and guide recovery. Required resources (none declared, optional CLAWDNA_HUB_TOKEN) match this purpose.
Instruction Scope
SKILL.md explicitly directs the agent to check and act on workspace identity files (SOUL.md, IDENTITY.md, MEMORY.md, TOOLS.md, openclaw.json) and to suggest or run clawdna commands. These file accesses are necessary for the stated purpose. It references a local sanitizer and ~/.clawdna/.secretsignore for secrets handling, which is expected for a backup tool.
Install Mechanism
Instruction-only skill with no install spec or downloaded code. The README instructs the user to install the clawdna CLI separately (npm install -g clawdna), which is a reasonable separate dependency; nothing in the skill attempts to fetch arbitrary code itself.
Credentials
No required environment variables; one optional CLAWDNA_HUB_TOKEN is declared and justified for hub sync operations. No unrelated credentials or wide-ranging secrets are requested by the skill.
Persistence & Privilege
always is false (normal). The skill does not request system-wide config changes or access to other skills' credentials. Autonomous invocation is allowed by default but not combined with elevated privileges or broad credential requests.
Assessment
This skill is coherent for backing up and syncing OpenClaw identity files. Before installing or using it: (1) install the clawdna CLI from the official project and verify the package source; (2) only provide CLAWDNA_HUB_TOKEN if you trust the configured hub and its operator (a hub token allows remote storage of identity files); (3) inspect ~/.clawdna/.secretsignore and test the sanitizer on sample files to ensure secrets are not being pushed; (4) be aware the agent will read identity files (SOUL.md, MEMORY.md, openclaw.json) in your workspace—review those files for sensitive contents before syncing to a remote hub.

Like a lobster shell, security has layers — review code before you run it.

latestvk97ewt17ha3tdj5ahvt0je2j4983cjtc
153downloads
0stars
2versions
Updated 1mo ago
v1.0.1
MIT-0

ClawDNA -- Identity Backup & Sync

You have the ClawDNA skill installed. ClawDNA is a CLI tool that versions and syncs your identity files (SOUL.md, AGENTS.md, IDENTITY.md, MEMORY.md, TOOLS.md, USER.md) so they never drift or get lost. Your job is to proactively help the user protect their agent identity using ClawDNA commands.


When to Act

Suggest a snapshot before risky changes

Before any of the following, suggest running clawdna snapshot:

  • Upgrading the OpenClaw runtime or any major dependency
  • Editing SOUL.md, AGENTS.md, or IDENTITY.md (core personality files)
  • Installing or removing skills/plugins that modify TOOLS.md
  • Changing channel configurations or workspace structure
  • Running clawdna memory distill for the first time

Example prompt to the user:

This change could affect your identity files. Want me to run clawdna snapshot --name "before-<change>" first so you can roll back if needed?

Warn when the last push is stale

If the user mentions syncing, backups, or switching machines -- or if you have reason to believe the last clawdna push was more than 24 hours ago -- remind them:

It's been a while since your last push. Run clawdna push to sync your latest identity to the hub, or clawdna diff to see what's changed.

Detect identity drift

If you notice that identity files (SOUL.md, MEMORY.md, etc.) have been edited directly without a subsequent snapshot or push, flag it:

Your identity files have changed since the last snapshot. Run clawdna diff --local to review the changes, then clawdna push to sync.

Guide recovery

If the user mentions lost settings, a broken agent, or setting up a new machine, guide them through recovery:

  1. New machine: clawdna clone --agent-id <id> to pull the full identity from hub
  2. Rollback: clawdna restore --bundle <path> to revert to a previous snapshot
  3. Diagnose: clawdna doctor to check installation health and hub connectivity

CLI Command Reference

Core Commands

CommandWhat it does
clawdna initInteractive setup -- detects your workspace and configures the hub (Cloud, Git, or local)
clawdna snapshot [--name <name>]Creates a timestamped .dna bundle of all identity files
clawdna restore --bundle <path> [--dry-run]Restores identity from a .dna bundle; use --dry-run to preview
clawdna diff [--local | --hub]Shows changes between local identity and hub, or since last sync
clawdna logDisplays identity change history with timestamps

Sync Commands

CommandWhat it does
clawdna push [--message <msg>]Pushes current identity to the configured hub
clawdna pull [--dry-run]Pulls latest identity from hub; shows diff before applying
clawdna clone --agent-id <id>Bootstraps a new machine by downloading identity from hub
clawdna fleet [--env-ids <ids...>]Pushes identity to multiple environments simultaneously

Management Commands

CommandWhat it does
clawdna env add|list|switchManages environment profiles (per-machine tokens and overrides)
clawdna memory distill [--dry-run]Uses an LLM to extract key facts from session memory into core identity
clawdna memory showDisplays the current contents of MEMORY.md
clawdna daemon start|stop|statusBackground sync daemon -- watches for changes and auto-pushes
clawdna doctorHealth check -- verifies config, permissions, hub connectivity, and OpenClaw state
clawdna upgrade [--channel <ch>]Safe OpenClaw upgrade -- snapshots before, verifies identity after, offers rollback

What Gets Backed Up

ClawDNA manages these identity files from your OpenClaw workspace:

FilePurpose
SOUL.mdPersonality, values, and behavioral rules
AGENTS.mdWorkspace conventions and operating rules
IDENTITY.mdHow the agent presents itself
MEMORY.mdAccumulated knowledge about the user
TOOLS.mdInstalled skills and tool configurations
USER.mdUser-specific context and preferences
openclaw.jsonRuntime configuration (secrets are stripped automatically)

What is NOT backed up (secrets protection)

ClawDNA's sanitizer runs as a hard gate before every push, snapshot, and export. It blocks the operation if it detects:

  • API keys (OpenAI, Anthropic, etc.)
  • Bot tokens (Telegram, Discord)
  • JWTs and bearer tokens
  • Private key headers
  • Any pattern matching user-defined rules in ~/.clawdna/.secretsignore

Inline secrets in openclaw.json are automatically replaced with $ENV_VAR_NAME references. The operation aborts if secrets are found in any markdown identity file.


Troubleshooting

"Secrets detected" error

The sanitizer found a secret in your identity files. This is intentional -- secrets must never leave your machine.

Fix: Remove the secret from the flagged file and use an environment variable reference instead. Run the command again after cleaning.

If this is a false positive, you can add an exception pattern to ~/.clawdna/.secretsignore.

Hub unreachable

clawdna push or clawdna pull can't connect to the hub.

Diagnose: Run clawdna doctor -- it checks hub connectivity and authentication.

Common causes:

  • Missing or expired hub token (check CLAWDNA_HUB_TOKEN env var or run clawdna env switch)
  • Network issues or firewall blocking the hub URL
  • Hub URL misconfigured (check ~/.clawdna/config.json)

Conflict on pull (diverged state)

Both local and hub have changes since the last sync.

Fix: clawdna pull will show the diff and prompt you to choose: hub wins, local wins, or cancel. Review the diff carefully before deciding. You can always clawdna snapshot first to save your current state.

Identity changed after upgrade

clawdna upgrade detected that core identity files were modified by the OpenClaw update.

Fix: The upgrade command offers an automatic rollback. If you declined, you can still run:

clawdna restore --bundle ~/.clawdna/snapshots/pre-upgrade-<version>.dna

Doctor reports permission warnings

Config files should be 600 (owner read/write only) and snapshot directories should be 700.

Fix: Run chmod 600 ~/.clawdna/config.json and chmod 700 ~/.clawdna/snapshots/.

Comments

Loading comments...