| name | description |
|---|---|
openclaw-update |
Safe, deliberate OpenClaw upgrade workflow with pre-flight evaluation, backup, update, and post-verification. Use when the user asks to update or upgrade OpenClaw, says a new release dropped, wants to know if they should update, or asks about version pinning. This skill is the canonical upgrade path: it evaluates whether updating is worth it before touching anything. |
This skill is the full upgrade path — from "should I?" to "done, verified."
Never run openclaw update raw. Always go through this workflow.
bash ~/clawd/skills/openclaw-update/scripts/pre-flight.shRead the output carefully. Summarize for the user:
- Current version → latest version
- What changed (release notes)
- Open critical bugs on the new version
- Your recommendation: UPDATE / WAIT / PIN
Wait for explicit human approval before proceeding.
Decision framework:
- Bug you're hitting is fixed → lean UPDATE
- Critical open bugs on latest → lean WAIT
- Stable right now, no needed features → default STAY PUT
- Version pinned intentionally → require override
If the answer is WAIT or STAY PUT: run pin-version.sh to record the freeze and stop here.
bash ~/clawd/skills/openclaw-update/scripts/pin-version.shOnly run this after explicit human approval to proceed.
bash ~/clawd/skills/openclaw-update/scripts/pre-update.shCreates a timestamped backup of: openclaw.json, auth profiles, systemd unit files. Ensures WORKFLOW_AUTO.md sentinels exist in all agent workspaces.
Use the gateway tool — do NOT use exec for this step:
gateway.action = update.run
note = "OpenClaw updated. Running post-verify now."
The gateway will restart. The session will drop. That is expected.
After the gateway pings back:
bash ~/clawd/skills/openclaw-update/scripts/post-verify.shChecks (in order):
- Version actually bumped
- Gateway health (Telegram, WhatsApp)
- Model fallback chain (claude-sonnet-4-6 should be first fallback — rate limit reason)
- Device token scopes (known bug: 2026.2.19+ drops operator.write/read — auto-detects + prints fix)
- Daemon services (dreamer, forgeloop-paneforge, forgeloop-gablus)
- WORKFLOW_AUTO.md sentinels (missing = boot-md loop on every startup)
- Memory readonly errors
If post-verify flags device token scope issues:
openclaw devices rotate \
--device <id> --role operator \
--scope operator.admin --scope operator.approvals --scope operator.pairing \
--scope operator.write --scope operator.readLATEST=$(ls -1dt ~/.openclaw/backups/*/ | head -n1)
cp "$LATEST/openclaw.json" ~/.openclaw/openclaw.json
# Restore prior version via npm if needed:
# npm install -g openclaw@<prior-version>
systemctl --user restart openclaw-gateway.serviceTo freeze on a known-good version:
bash ~/clawd/skills/openclaw-update/scripts/pin-version.sh
# Stores current version in ~/.openclaw/PINNED_VERSION
# Pre-flight will warn before upgrading past this pointTo unpin: rm ~/.openclaw/PINNED_VERSION