Install
openclaw skills install upgrade-guardianA cognitive protocol for safely managing and auditing OpenClaw application upgrades. Analyzes configuration-level risks (schema, defaults) and runtime-level...
openclaw skills install upgrade-guardianThis skill defines a formal, multi-phase cognitive protocol for an agent to execute when tasked with managing an application upgrade. Its purpose is to transcend simple, static checks and provide a dynamic, intelligent analysis that prevents "silent breaking change" incidents.
This is not a script. It is a directive for higher-order reasoning.
An application upgrade is a high-stakes event. The agent must not trust that the upgrade is safe. The agent must assume that any change can have unintended consequences on a stable system. The goal is to make implicit environmental assumptions explicit and resilient before they break.
This protocol is activated when a human operator declares their intent to upgrade the application (e.g., "We are planning to upgrade OpenClaw from vA to vB").
Upgrade Guardian covers two categories of risks:
Configuration-level risks: Changes that affect openclaw.json or static config files
Runtime-level risks: Changes that affect behavior without config modifications
/new behavior)See references/RISK_CATEGORIES.md for detailed taxonomy.
CHANGELOG or release notes for the target version range.references/changelog_analysis_patterns.md.
openclaw.json and identify dependencies on implicit behaviorsFor each identified change, generate concrete, testable failure scenarios:
Config-level examples:
allowlist now requires explicit IP ranges? → Plugin executions fail."Runtime-level examples:
/new now creates independent sessions instead of resetting shared session? → User workflow disrupted."Assign a risk score based on:
Present findings to the operator using the template in references/AUDIT_REPORT_TEMPLATE.md.
Key sections:
For config risks: Propose specific openclaw.json changes to make implicit assumptions explicit. Do not execute without operator approval.
For runtime risks: Document expected behavioral changes and suggest workflow adjustments if needed.
Define clear, simple tests for each risk:
Config verification examples:
openclaw doctor and confirm no validation errors"gateway.err.log for auth mode complaints"Runtime verification examples:
/new, confirm it creates independent session"After the operator confirms upgrade is complete:
Save the upgrade write-ups and check results inside the agent workspace so they remain discoverable and portable.
Write locations (relative paths):
kb/logs/upgrade-reports/YYYY-MM-DD_<from>-to-<to>_upgrade-analysis.mdkb/logs/upgrade-verifications/YYYY-MM-DD_post-upgrade-verification.txtNotes:
kb/ is a symlink in a particular deployment, still refer to it as kb/... in the protocol/report; the filesystem mapping is an implementation detail.references/changelog_analysis_patterns.md - Semantic analysis patternsreferences/RISK_CATEGORIES.md - Detailed risk taxonomyreferences/AUDIT_REPORT_TEMPLATE.md - Report structurereferences/VERIFICATION_CHECKLIST.md - Common verification tests