Error Guard — Control‑Plane Safety
v1.0.0System safety and control-plane skill that prevents agent deadlocks and freezes. Provides non-LLM control commands to inspect task state, flush message queues, cancel long-running work, and recover safely without restarting the container. Use when implementing or operating long-running tasks, sub-agents, benchmarks, background monitors (e.g., Moltbook, PNR checks), or when the system becomes unresponsive and needs immediate recovery controls.
⭐ 8· 3k·13 current·13 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name/description (control‑plane safety, task registry, flush/recover) match the code: registry, status/flush/recover commands, spawn and session helpers, and watchdog logic are all present and serve the stated purpose.
Instruction Scope
SKILL.md promises no LLM calls, no payload storage, and minimal state; the code follows this model (only task metadata persisted). One minor mismatch: SKILL.md says 'no external I/O' but example worker (moltbook-worker) contains a placeholder fetch simulation (currently no real network call). The control APIs (sessions_send, sessions_spawn, process.list/kill) are platform SDK calls and are expected for a control‑plane skill, but they do give the skill wide runtime reach.
Install Mechanism
No install spec (no external downloads) which is low risk. However the package contains TypeScript source files; there is no build/install instruction in SKILL.md — ensure the platform will compile/load these sources as expected. There is also a small syntax/typo artifact (imports using 'as any') that should be reviewed before runtime.
Credentials
The skill declares no environment variables, credentials, or config paths and the code does not access secrets or external API keys. Persisted state is limited to a local state.json containing only task metadata (taskId, timestamps, state).
Persistence & Privilege
This skill has significant control-plane privileges: it can spawn sub‑agents (sessions_spawn), send session messages (sessions_send), list and kill exec/sessions (process.list/process.kill), and it writes a local state file. These capabilities are coherent with its purpose but mean the skill can affect other running tasks and system behavior — test in an isolated environment and restrict who can invoke it. Note: always:true is not set (good); autonomous invocation is allowed by default (platform default).
Assessment
What to consider before installing:
- This is a control‑plane tool: it can spawn and kill sessions and will clear the in‑memory registry and attempt to kill exec sessions on /flush. Those are powerful actions that can interrupt other work; run it in a test environment first.
- The skill does not ask for credentials and only persists minimal task metadata to skills/error-guard/state.json, but verify that path and file permissions are acceptable in your deployment.
- Review the SDK calls (sessions_spawn, sessions_send, process.list, process.kill) to confirm they are scoped to the agent/session boundaries you expect — ensure it cannot inadvertently kill unrelated system processes.
- There are a few minor code hygiene issues (odd 'as any' import syntax) — ensure the code compiles or is adapted to your runtime before enabling it in production.
- If you want to reduce risk, restrict who can invoke this skill, avoid giving it always:true, and test its /flush behavior to confirm it only affects intended sessions.Like a lobster shell, security has layers — review code before you run it.
latestvk979q0y7631c86zsxndhaade3n80aff8orchestrationvk979q0y7631c86zsxndhaade3n80aff8reliabilityvk979q0y7631c86zsxndhaade3n80aff8safetyvk979q0y7631c86zsxndhaade3n80aff8sub-agentvk979q0y7631c86zsxndhaade3n80aff8systemvk979q0y7631c86zsxndhaade3n80aff8watchdogvk979q0y7631c86zsxndhaade3n80aff8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
