Install
openclaw skills install clawcolabClawHub Security found sensitive or high-impact capabilities. Review the scan results before using.
Coordinate multiple OpenClaw instances in a shared GitHub repository under a half-trust model with secrecy boundaries, approval gates, structured tasks, claims, handoffs, risks, and decision records. Use when users want secure multi-agent GitHub collaboration across people or devices without exposing private local memory, secrets, or unrestricted authority.
openclaw skills install clawcolabCoordinate work through a shared GitHub repository without treating the repository as a full-context memory sync.
Assume a half-trust environment:
When the user is new to ClawColab, do not introduce the full governance surface at once. Start with the smallest useful workflow:
assets/minimal-start/TASK-001.yaml, assets/minimal-start/PROPOSAL-001.md, and assets/minimal-start/DECISION-001.mdDo not introduce claim, handoff, risk, sealed, or advanced governance choices unless the task actually requires them.
Treat those as second-stage features.
Classify every piece of information before placing it in the repository.
privateKeep local only. Never place in the shared repository. Examples: secrets, local paths, USER.md or TOOLS.md contents, personal conversations, raw local memory.
sealedAllow summary-only references without exposing the sensitive body. Allowed: short summary, owner, status, access note without sensitive details. Forbidden: full text, secrets, personal identifiers unless approved.
shared-teamAllow active collaborators in the repository to read and act on the content. Examples: tasks, approved plans, interface notes, handoffs, non-sensitive execution context.
public-repoAllow broad repository visibility. Use only for approved non-sensitive documentation and generalized procedures.
Before writing or commenting in the repository:
assets/classification-checklist.mdprivate or sealedIf visibility is ambiguous, do not share raw content.
Read references/classification-guide.md when classification feels subjective or inconsistent.
Never place these into the repository unless the human explicitly approves:
Use structured repository artifacts instead of loose discussion whenever possible.
Primary object types:
taskproposalclaimdecisionhandoffstatusrisksealed-refUse or adapt this structure:
workspace/
tasks/
proposals/
decisions/
handoffs/
risks/
policy/
visibility-policy.yaml
role-policy.yaml
approval-policy.yaml
claims/
sealed/
INDEX.md
Do not store secret bodies under sealed/. Store only sealed references and summaries.
Use the bundled templates in assets/ when creating new collaboration artifacts.
For first-time users, start with assets/minimal-start/TASK-001.yaml, assets/minimal-start/PROPOSAL-001.md, and assets/minimal-start/DECISION-001.md.
Use the bundled scripts in scripts/ to generate starter structures and validate task or payload safety when needed.
Read references/pre-share-checks.md before sharing proposals, decisions, handoffs, risks, or summaries.
Read references/approval-model.md when approval ambiguity exists.
Read references/role-model.md when task ownership or role eligibility is unclear.
Read references/governance-modes.md when choosing between strict and relaxed repo governance.
Represent tasks as structured records. A task should include:
Recommended status values:
openpending_approvalapprovedin_progressblockedhandoff_neededdonecancelledRecommended mode values:
proposal-approvalclaimableUse for sensitive, ambiguous, or higher-impact work.
Procedure:
Use proposal-approval mode by default unless the repo policy clearly allows autonomous claiming.
Use only when repository policy allows task claiming and the task is explicitly marked mode: claimable. Treat proposal-approval as the default for all other work.
Before claiming:
openapproval_required: true, unless approval policy explicitly allows a pending claim statepolicy/role-policy.yaml and policy/approval-policy.yaml do not block the claimThen:
in_progress only if policy permits automatic claimingpending_approvalIf there is a conflict, do not silently override another agent. Record the conflict and request adjudication. High-risk or policy-adjacent work should default to proposal-approval.
Use simple roles to guide task assignment. Suggested roles:
coordinatorarchitectimplementerreviewersecurity-reviewerresearcherdocumenterhuman-approverRead policy/role-policy.yaml when present and follow it as the repo-specific authority for who may propose, claim, review, or approve.
Agents may suggest assignments, but humans should approve high-impact or sensitive work.
Prefer separation of duties for high-risk work: a non-human agent may draft or implement, but a human approver should finalize boundary-crossing actions.
Read policy/approval-policy.yaml when present and follow it as the repo-specific gate definition.
Require human approval before:
private or sealed to a broader levelpolicy/visibility-policy.yaml, policy/role-policy.yaml, or policy/approval-policy.yamlTreat visibility promotion as blocked unless an explicit decision record exists first. Use assets/visibility-promotion-decision-template.md when promoting any artifact or information class to a broader visibility level.
If policy is unclear, pause at the approval boundary instead of guessing.
Before writing a proposal, decision, handoff, risk, or shared summary:
scripts/validate-collab-payload.py on the artifact when possibleUse explicit records instead of burying meaning in chat or comments.
Include: title, status, approver, source proposal, final decision, rationale, scope, and effective reference.
Include: from, to, task id, current status, completed work, remaining work, risks, and referenced artifacts.
Create a risk record when secrecy is unclear, metadata may leak, claims conflict, or dependencies are under-specified. Include severity, description, mitigations, and escalation path.
Include only id, title, owner, summary, status, access note, and related tasks. Never include secret values or protected body content.
Prefer this pattern:
workspace/proposals/ or PR descriptionsworkspace/tasks/workspace/decisions/workspace/handoffs/workspace/risks/Use branches conservatively, for example:
proposal/...task/...review/...Treat main as the source of approved shared state unless the repository defines another default branch.
Be structured and explicit.
Prefer:
Avoid:
When contributing, ask:
If the exact detail is not necessary, do not include it.
If multiple agents disagree:
Do not invent consensus.
If you cannot complete a task safely:
Do not “helpfully” over-share to compensate for uncertainty.
A collaboration run is successful when: