Config-Sentinel

v1.0.0

A strict guardrail for OpenClaw config changes. Snapshot before editing, validate after editing, and rollback immediately when config health fails. Built to...

1· 105·0 current·0 all-time
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill's name, SKILL.md, and included script align: it snapshots (~/.openclaw/.sentinel), validates (~/.openclaw/openclaw.json by default), and can rollback. Minor mismatch: the script relies on python3 (and optionally git) but the registry metadata did not list these as required binaries.
Instruction Scope
SKILL.md and scripts/sentinel.sh stay within scope: they read the configured OpenClaw config file, optionally check files referenced by agent workspaces, create backups, commit/restore from git if available, and validate JSON/structure. No external network endpoints or data exfiltration are present in the script.
Install Mechanism
Instruction-only skill with a bundled Bash script; no install/downloads or package installs. Nothing is fetched from external URLs or written outside the sentinel/config directories except for restoring the target config file (intended behavior).
Credentials
No credentials or secrets are required. Optional env vars control paths and validation toggles (including a flag to check Telegram tokens). The script reads config content (which may contain tokens) but does not transmit them externally; ensure you understand that sensitive tokens may be read and potentially appear in local logs/backups.
Persistence & Privilege
The skill does not request always:true and is user-invocable. It writes backups and logs to ~/.openclaw/.sentinel and may overwrite the config on rollback — this is expected for a rollback tool, not an unexplained privilege escalation.
Assessment
This skill appears to do exactly what it claims: take backups, validate OpenClaw config, and restore it if needed. Before installing or running it: 1) inspect scripts/sentinel.sh yourself (you have it) and confirm you trust it; 2) ensure python3 is available (the script uses python3 inline) and git is available if you want git snapshots; 3) be aware it will write backups/logs to ~/.openclaw/.sentinel and may overwrite ~/.openclaw/openclaw.json on rollback — ensure directory permissions and storage are acceptable; 4) remember to run scripts/sentinel.sh pre-change before editing and obtain human approval as recommended; 5) if your config contains secrets (API tokens) consider where backups/logs are stored and whether they need extra protection. Overall: coherent and appropriate for its purpose, with the small metadata/requirements mismatch noted above.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

🛡️ Clawdis
latestvk97d266ntj7h3kpss7art8ts6983j8zb
105downloads
1stars
1versions
Updated 3w ago
v1.0.0
MIT-0

Config-Sentinel

Use this skill whenever you are modifying OpenClaw configuration.

This is not a soft suggestion. Config changes are high-risk operations. A single bad edit can break agent routing, bindings, startup behavior, or entire multi-agent setups.

If config integrity matters, do not skip this workflow.

This skill is especially useful for:

  • manual edits to the main OpenClaw config file
  • scripted config patches
  • agent/binding/channel changes
  • diagnosing whether a config file is malformed or incomplete
  • recovering from a broken config change

Purpose

Config-Sentinel exists because successful writes are not the same as healthy config.

A config file can be:

  • syntactically broken
  • structurally incomplete
  • silently truncated
  • internally inconsistent
  • accepted by an editor but dangerous at runtime

This skill enforces a strict safety workflow:

  1. snapshot before changes
  2. validate after changes
  3. rollback immediately if validation fails
  4. run health checks when config behavior looks suspicious

Approval Rule

Do not change OpenClaw config without explicit user approval.

Snapshot/rollback protects against corruption. It does not replace human approval.

The correct order is:

  1. get approval to make the config change
  2. run pre-change
  3. make the change
  4. run validate
  5. rollback if needed
  6. report the result clearly

Core Workflow

Before editing config:

scripts/sentinel.sh pre-change

After editing config:

scripts/sentinel.sh validate

If validation fails:

scripts/sentinel.sh rollback

For an on-demand health check:

scripts/sentinel.sh health

Non-negotiable rule

Do not edit config first and hope validation will save you later.

The correct order is always:

  1. snapshot
  2. edit
  3. validate
  4. rollback if needed

What It Protects Against

Config-Sentinel is designed to catch or soften failures such as:

  • malformed JSON
  • incomplete or truncated config writes
  • missing agent entries
  • bindings that reference missing agents
  • invalid channel/account structure
  • missing expected config file after an edit
  • accidental regressions after a patch

It also creates recovery points so rollback is straightforward.


Features

Pre-change snapshot

Before any config edit, create:

  • a timestamped backup copy
  • a git snapshot when the config directory is in a git repo
  • a remembered last-known-good revision for rollback

Validation

After a config change, validate:

  • JSON parseability
  • presence of expected high-level keys
  • minimum agent count threshold
  • bindings referencing real agent ids
  • optional required workspace files
  • optional provider-specific checks

Rollback

Restore the last-known-good config snapshot if a change breaks structure or validation.

Health check

Run validation without making changes to assess config health.

Strict posture

This skill is intentionally strict. Config changes are one of the easiest ways to break a working OpenClaw setup.


Defaults and Overrides

The helper script uses sensible defaults, but supports environment overrides.

Default paths

  • config file: ~/.openclaw/openclaw.json
  • sentinel state dir: ~/.openclaw/.sentinel

Optional environment variables

  • CONFIG_SENTINEL_CONFIG_FILE
  • CONFIG_SENTINEL_DIR
  • CONFIG_SENTINEL_MIN_AGENTS
  • CONFIG_SENTINEL_REQUIRED_FILES
  • CONFIG_SENTINEL_VALIDATE_BINDINGS
  • CONFIG_SENTINEL_VALIDATE_TELEGRAM_TOKENS

This allows the skill to adapt to different setups while keeping a strict default posture.


Best Practice Pattern

When an agent is asked to change config, the safe pattern is:

  1. run pre-change
  2. apply the config change
  3. run validate
  4. if validation fails, run rollback
  5. tell the user clearly whether the config is healthy

Do not silently edit config without a recovery path. Do not trust a successful write alone. Do not continue after validation failure unless the user explicitly wants forensic inspection instead of safety.


Generic Example

Good

scripts/sentinel.sh pre-change
# edit config
scripts/sentinel.sh validate || scripts/sentinel.sh rollback

Good agent wording

  • “I created a config snapshot before editing.”
  • “Validation passed after the patch.”
  • “Validation failed, so I rolled back to the last-known-good config.”

Bad

  • editing config directly with no snapshot
  • assuming the file is fine because the write completed
  • continuing after parse errors or missing agent references

Notes

This skill does not run continuously. It is an on-demand guardrail for risky config operations.

Use it whenever config integrity matters more than speed. If you are about to patch or rewrite config and you are tempted to skip the snapshot step, that is exactly when you should not skip it.


Summary

Config-Sentinel helps make OpenClaw config changes safer by combining:

  • snapshots
  • validation
  • rollback
  • health checks

The goal is simple:

make config edits recoverable instead of catastrophic.

Comments

Loading comments...