ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      JonathanJing

      Safety Report

      ground-control

      @JonathanJing

      Post-upgrade verification system for OpenClaw. Defines a model/cron/channel ground truth file and a 5-phase automated verification flow (config integrity, AP...

      105Downloads
      0Installs
      0Stars
      10Versions
      Workflow Automation8,822File Management5,911Browser Automation5,375Social Media3,597

      Security Analysis

      high confidence
      Clean0.08 risk

      The skill's requested actions and instructions are consistent with a post-upgrade verification tool — it reads runtime config, runs verification steps, and can auto-fix config/cron drift; nothing requested is disproportionate to that purpose.

      Mar 4, 20266 files2 concerns
      Purpose & Capabilityok

      The skill's name/description match what it does: 5-phase verification and optional auto-repair of config and cron. The capabilities it needs (read/patch config, list/update cron, spawn sessions, send messages) are coherent and necessary for those features.

      Instruction Scopenote

      All runtime instructions are contained to OpenClaw primitives (gateway, cron, sessions_spawn, message). The skill explicitly instructs the agent to redact sensitive nodes (auth/plugins/credentials) and to never log literal secrets. It reads runtime config and writes a non-sensitive report to memory/ and an ops channel (expected). This is scoped appropriately, but it relies on correct runtime enforcement of the redaction rules — a buggy agent implementation could still leak secrets.

      Install Mechanismok

      Instruction-only skill with no install spec and no downloaded code. Lowest-risk install mechanism.

      Credentialsok

      The skill declares no environment variables or external credentials. It uses the platform's existing runtime capabilities to probe provider liveness and channels; this is proportional to its stated purpose.

      Persistence & Privilegenote

      The skill can auto-patch runtime config and cron (powerful operations). Auto-fix is bounded by guardrails (dry-run, pause if >3 fields changed, logs before/after). Users should ensure the agent has only necessary permissions and that backups are available before enabling auto-fix.

      Guidance

      This skill is internally consistent for post-upgrade verification, but it performs powerful changes (gateway config.patch and cron update). Before installing: 1) Ensure the controlling agent has appropriate, least-privilege permissions; 2) Back up your runtime config; 3) Run the skill in --dry-run / report-only mode first to inspect the drift report and confirm redaction behavior; 4) Confirm the ops channel destination is internal and not an external webhook; 5) Review MODEL_GROUND_TRUTH.md to ensure it contains no secrets or credentials. If you rely on the skill's zero-secret logging, audit its first few runs to verify no secret leakage occurs.

      Latest Release

      v0.3.5

      Updated version to v0.3.5 with full changelog integration.

      More by @JonathanJing

      openclaw-dashboard

      3 stars

      rag-eval

      2 stars

      glass2claw

      1 stars

      Discrawl Search

      @jonathanjing · 0 stars

      openclaw-tally

      0 stars

      deep-scout

      0 stars

      Published by @JonathanJing on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]