ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      JonathanJing

      Safety Report

      ground-control

      @JonathanJing

      Post-upgrade verification system for OpenClaw. Defines a model/cron/channel ground truth file and a 5-phase automated verification flow (config integrity, AP...

      105Downloads
      0Installs
      0Stars
      10Versions
      Workflow Automation3,323File Management2,100Browser Automation1,737AI & Machine Learning1,383

      Security Analysis

      high confidence
      Clean0.08 risk

      The skill's requested actions and instructions are consistent with a post-upgrade verification tool — it reads runtime config, runs verification steps, and can auto-fix config/cron drift; nothing requested is disproportionate to that purpose.

      Mar 4, 20266 files2 concerns
      Purpose & Capabilityok

      The skill's name/description match what it does: 5-phase verification and optional auto-repair of config and cron. The capabilities it needs (read/patch config, list/update cron, spawn sessions, send messages) are coherent and necessary for those features.

      Instruction Scopenote

      All runtime instructions are contained to OpenClaw primitives (gateway, cron, sessions_spawn, message). The skill explicitly instructs the agent to redact sensitive nodes (auth/plugins/credentials) and to never log literal secrets. It reads runtime config and writes a non-sensitive report to memory/ and an ops channel (expected). This is scoped appropriately, but it relies on correct runtime enforcement of the redaction rules — a buggy agent implementation could still leak secrets.

      Install Mechanismok

      Instruction-only skill with no install spec and no downloaded code. Lowest-risk install mechanism.

      Credentialsok

      The skill declares no environment variables or external credentials. It uses the platform's existing runtime capabilities to probe provider liveness and channels; this is proportional to its stated purpose.

      Persistence & Privilegenote

      The skill can auto-patch runtime config and cron (powerful operations). Auto-fix is bounded by guardrails (dry-run, pause if >3 fields changed, logs before/after). Users should ensure the agent has only necessary permissions and that backups are available before enabling auto-fix.

      Guidance

      This skill is internally consistent for post-upgrade verification, but it performs powerful changes (gateway config.patch and cron update). Before installing: 1) Ensure the controlling agent has appropriate, least-privilege permissions; 2) Back up your runtime config; 3) Run the skill in --dry-run / report-only mode first to inspect the drift report and confirm redaction behavior; 4) Confirm the ops channel destination is internal and not an external webhook; 5) Review MODEL_GROUND_TRUTH.md to ensure it contains no secrets or credentials. If you rely on the skill's zero-secret logging, audit its first few runs to verify no secret leakage occurs.

      Latest Release

      v0.3.5

      Updated version to v0.3.5 with full changelog integration.

      More by @JonathanJing

      openclaw-dashboard

      3 stars

      rag-eval

      2 stars

      glass2claw

      1 stars

      Token Ledger (SQLite)

      0 stars

      deep-scout

      0 stars

      openclaw-tally

      0 stars

      Published by @JonathanJing on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]