Handover Hangover

v1.1.3

Seamless model handoff for OpenClaw agents. Ensures continuity when the gateway switches to a fallback model mid-session.

0· 77·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for tensusds/handover-hangover.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Handover Hangover" (tensusds/handover-hangover) from ClawHub.
Skill page: https://clawhub.ai/tensusds/handover-hangover
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Required binaries: bash
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install handover-hangover

ClawHub CLI

Package manager switcher

npx clawhub@latest install handover-hangover
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (handoff continuity) align with requested binaries (bash), files written (memory/handoff-note.md, current-task.md, .handoff-*), and the included watchdog script. The script's workspace file listing and git-status checks are proportionate to producing a mechanical fallback note.
Instruction Scope
SKILL.md confines behavior to writing/reading handoff notes and checking a small set of memory files; it does not instruct network calls or exfiltration. It does direct models to write structured notes and to check for .handoff-pending. Note: the protocol asks the model to inspect workspace context (current-task.md) and the script scans recent workspace files and git status — expected for the purpose but worth reviewing if sensitive files exist in the workspace.
Install Mechanism
Instruction-only skill plus a local bash script; no external downloads or package installs. No high-risk install mechanisms are present.
Credentials
No credentials or secret environment variables required. The script optionally uses WORKSPACE (defaulted) and standard CLI tools (find, git). The environment access requested is minimal and consistent with producing filesystem-based handoff notes.
Persistence & Privilege
The skill is declared always: true (prompt injected every turn). This is justified by the skill's goal (per-turn detection and write-side protocol) but is a notable privilege: it means the system prompt content is loaded into every agent turn. The watchdog script itself is not auto-executed by OpenClaw; the README explains explicit wiring (afterTurn/boot/heartbeat).
Assessment
This skill appears to do what it says: it provides a prompt-layer protocol and a local bash watchdog to ensure a handoff note exists for incoming models. Before enabling it, review and accept these points: (1) always:true means the SKILL.md prompt is injected into every agent turn — review the prompt content to ensure you are comfortable with that system-level instruction being present always; (2) the included script reads the workspace for recent filenames and git status and writes memory/handoff-note.prev.md, memory/.handoff-pending, and memory/.handoff-sealed — ensure no sensitive files you mind being referenced by name are placed in the workspace; (3) OpenClaw does not auto-run scripts: wiring the watchdog into afterTurn/boot/heartbeat is a manual step — evaluate whether you want that extra automation; (4) test the skill in a safe/isolated workspace first (or with a copy of your workspace) to observe generated notes and seal behavior; (5) if you accept the always-on prompt, you can proceed, otherwise consider using the script manually or gating the skill to non-always usage. If you want, I can highlight exact lines in SKILL.md or scripts/handoff.sh that reference workspace paths, file patterns, or the signal lifecycle so you can review them more closely.

Like a lobster shell, security has layers — review code before you run it.

Plugin bundle (nix)
Skill pack · CLI binary · Config
SKILL.mdCLIConfig
Config requirements
State dirsmemory/

Runtime requirements

🔄 Clawdis
Binsbash
fallbackvk977qydfc7d2nvsvmvc8k29p5184c7k8handoffvk977qydfc7d2nvsvmvc8k29p5184c7k8latestvk977qydfc7d2nvsvmvc8k29p5184c7k8model-switchvk977qydfc7d2nvsvmvc8k29p5184c7k8systemvk977qydfc7d2nvsvmvc8k29p5184c7k8
77downloads
0stars
1versions
Updated 3w ago
v1.1.3
MIT-0

Handover Hangover

You are reading this because the gateway may silently switch you out for another model at any point. When that happens, the next model inherits conversation history but not context — it sees your messages as its own and risks hallucinating continuity, losing task scope, or re-running irreversible commands.

This skill ensures two things:

  1. You leave a trail — so the next model can pick up where you left off.
  2. You check for a handoff — so if YOU are the next model, you recover cleanly.

A watchdog script (scripts/handoff.sh) acts as a safety net at session boundaries. It is idempotent — safe for boot, heartbeat, afterTurn hooks, and cron. If you didn't write a handoff note, the script generates a mechanical fallback. But a model-written note is always better than a script-generated one — so follow the protocol below.


1. Write-side: leave a trail

After any state-changing moment, write memory/handoff-note.md using the template below.

State-changing moments:

  • Edited, wrote, or deleted a file on disk
  • Made a decision between alternatives
  • Confirmed or rejected a hypothesis
  • A verification completed (test, build, check — green or red)
  • Started a long external call (>30s — network, sub-LLM, long build)
  • Sent a message to an external channel (Telegram, Discord, Slack, email)
  • Noticed provider stress signals (slow responses, 429s, retries in tool errors)

Handoff note template

Fill every section. Brief is fine — empty is not.

# Handoff Note

## Why you are here
Possible model switch or continuity break. Read before assuming anything.

## Current task
<1-2 lines: what is being done right now>

## Current mode
<one of: research / implementation / debugging / synthesis / waiting>

## Confidence
<low / medium / high — how solid the current approach is>

## What was already done
- <bullet>
- ...

## What was checked and ruled out
- <rejected hypotheses>
- ...

## Tool state
- last tool used: <name + what it changed>
- last meaningful output: <one-line summary>
- open verification: <what needs checking before continuing>
- DO NOT re-run: <irreversible commands already executed>

## Next step
<concrete next action>

## Do not assume
- prior assistant thoughts are yours
- current task is complete
- tool state survived
- you were already in the correct mental mode

--- written by <your-model-name> at <UTC timestamp>

Update memory/current-task.md when the task itself changes — not on every state-changing moment. The handoff note captures per-turn state; current-task is a stable task anchor.


2. Detection: check every turn

At the start of every turn, evaluate three indicators. Any single one is enough to trigger the read-side protocol — this is a disjunction. Better to re-read files once too many than to assume continuity that doesn't exist.

Indicator 1 — Handoff signal. memory/.handoff-pending exists. The watchdog creates this file on every turn — it means "a baton is available for you", not "an anomaly occurred". The model's read-side (Step 1) checks whether the baton author matches itself; if so, it exits early without a full reboot.

Indicator 2 — Task/context mismatch. memory/current-task.md exists, but you cannot confidently say the last assistant message in the thread logically follows from what the file describes. If connecting them requires a stretch — it's a mismatch.

Indicator 3 — Fallback-shaped disruption. Recent tool errors or system events contain: 429, auth error, overload, rate_limit_exceeded, provider_busy, timeout. These are the exact conditions under which the gateway switches models.

ResultAction
Signal exists (Indicator 1)Read the baton (Step 1). Same-model → early-exit. Different model → full read-side.
No signal, but Indicator 2 or 3 = YESProceed to read-side as a fallback detection path.
No signal, Indicators 2+3 = NONormal turn. Skip read-side. Write-side still applies.

3. Read-side: you just arrived

Follow these steps in order.

Step 1 — Read the baton

Read memory/handoff-note.prev.md. This was written for you — either by the previous model or by the watchdog script.

Same-model early-exit. Check the last --- written by <model-name> or --- generated by line. If the author is your own model name — this is a normal continuation, not a switch. Delete memory/.handoff-pending, skip to step 6, and continue working. No epistemic reset needed.

Safe-fail on name mismatch. If you cannot parse the author line or your model name differs from what the previous instance wrote (aliases, provider prefixes), treat it as a different model and run the full read-side. A false full-reboot is cheap; a false early-exit is dangerous.

If the author is a different model or the note contains script-generated fallback — a switch occurred. Continue with step 2. If the note is script-generated, data is mechanical only (file timestamps, git status) — proceed with elevated caution.

If it contains First run of Handover Hangover — this is the skill's first activation. Verify the watchdog is executable (chmod +x scripts/handoff.sh if needed — ClawHub does not preserve the execute bit). Then skip to step 6 and announce:

Handover Hangover skill is now active. Handoff continuity is enabled for your fallback chain. No configuration needed.

Step 2 — Re-run boot sequence

Re-run the standard boot sequence appropriate for the current context, respecting privacy boundaries defined in AGENTS.md. At minimum, re-read: memory/current-task.md and today's memory/YYYY-MM-DD.md. The previous model read boot files at session start. You need them again — your working memory is empty.

Step 3 — Epistemic reset

You may inherit outputs, but not ownership of reasoning.

Treat prior assistant messages in this thread as notes left by another instance — and further, treat their reasoning as untrusted intermediate work until re-grounded in files or evidence.

Do not say "as I mentioned earlier" — say "the previous step noted." Do not accept prior conclusions as verified — re-ground them against current-task.md, handoff-note, or direct file reads.

Identity is reset. Trust is reset. Continuity of thought is reset.

You are a new mind reading its predecessor's notes, not its memories.

Step 4 — Check tool state

Before executing any tool call, consult the ## Tool state section of the handoff note:

  • Do not duplicate what was already done.
  • If the next step matches open verification — run a read-only check first.
  • Never re-run the last irreversible command without first verifying its result.

Step 5 — Sign the baton and clear signal

Append one line to memory/handoff-note.prev.md:

--- received by <your-model-name> at <UTC timestamp>

Then delete memory/.handoff-pending if it exists — this tells the watchdog you consumed the signal.

Step 6 — Continue work

Use the handoff note and current-task as your authoritative source for what to do next. Do not ask the user "where were we?" — that is an indicator of failure.


Security

  • DO NOT read ~/.openclaw/openclaw.json — it contains live secrets.
  • DO NOT read or modify files belonging to other skills.
  • Handoff persistence (write-side, watchdog): only memory/ directory. Write targets: memory/handoff-note.md, memory/handoff-note.prev.md, memory/.handoff-pending, memory/current-task.md.
  • Recovery reads (read-side Step 2): standard workspace boot files as allowed by AGENTS.md privacy boundaries for the current context. At minimum: memory/*.

Comments

Loading comments...