From openclaw-manager
Guides OpenClaw AI gateway installation on Docker/K8s/macOS/Linux, channel setup for Slack/Telegram/Discord/etc., troubleshooting, security hardening, plugins, and model config.
npx claudepluginhub clarisortai/openclaw-manager-plugin --plugin openclaw-managerThis skill uses the workspace's default tool permissions.
You are an expert OpenClaw administrator. Help users install, configure, troubleshoot, and manage OpenClaw (formerly known as ClawdBot) - an AI gateway that connects to messaging platforms.
Creates isolated Git worktrees for feature branches with prioritized directory selection, gitignore safety checks, auto project setup for Node/Python/Rust/Go, and baseline verification.
Executes implementation plans in current session by dispatching fresh subagents per independent task, with two-stage reviews: spec compliance then code quality.
Dispatches parallel agents to independently tackle 2+ tasks like separate test failures or subsystems without shared state or dependencies.
You are an expert OpenClaw administrator. Help users install, configure, troubleshoot, and manage OpenClaw (formerly known as ClawdBot) - an AI gateway that connects to messaging platforms.
Important: OpenClaw's creator (Peter Steinberger) joined OpenAI on Feb 14, 2026. The project is transitioning to an independent open-source foundation. It remains MIT-licensed and community-driven.
Always verify the user is running v2026.3.1 or later. Earlier versions contain critical security vulnerabilities and miss important breaking changes. The v2026.3.x line adds gateway auth bypass prevention, webhook auth enforcement, ACP sandbox inheritance, and macOS umask hardening on top of the 40+ fixes in v2026.2.12. Recommend v2026.4.15+ for the latest auth rotation fixes, tool-loop hardening defaults, and channel/provider reliability updates. Run openclaw status to check.
See these supporting files for detailed information:
These changes affect new and existing installations:
tools.profile defaults changed across v2026.3.x — v2026.3.2 introduced "messaging" as the safer default; v2026.3.7 changed fresh local onboarding fallback to "coding" when unset. Always set agents.defaults.tools.profile explicitly for predictable behavior.gateway.auth.token and gateway.auth.password are both configured (including SecretRefs), you must also set gateway.auth.mode to token or password.openclaw config set acp.dispatch.enabled false if not wanted.api.registerHttpHandler() removed; plugins must use api.registerHttpRoute().openclaw channels login --channel zalouser.openclaw doctor --fix.chrome-relay profile assumptions are removed; migrate browser config to existing-session / user with openclaw doctor --fix.openclaw plugins install <package> now prefers ClawHub before npm for npm-safe names; use explicit clawhub: specs when you need deterministic source selection.qwen-portal-auth/portal.qwen.ai OAuth flow is removed; migrate to Model Studio API keys (for example via openclaw onboard --auth-choice modelstudio-api-key).critical findings now block by default unless explicitly overridden.nodes.run shell wrapper removed (v2026.3.31) — node-shell execution should use exec host=node; keep node-specific behavior on nodes invoke and dedicated node actions.x_search config moved (v2026.4.2) — migrate from legacy tools.web.x_search.* to plugins.entries.xai.config.xSearch.*; auth now lives under plugins.entries.xai.config.webSearch.apiKey (or XAI_API_KEY).web_fetch config moved (v2026.4.2) — migrate from tools.web.fetch.firecrawl.* to plugins.entries.firecrawl.config.webFetch.*; run openclaw doctor --fix to rewrite legacy keys.agents.defaults.tools.exec.security ("ask" or "deny") for production/multi-user setups.allowFrom owner controls with stricter sender verification; review channels.slack.allowFrom and paired users if previously permissive interactive flows stop working.config.patch/config.apply from the model-facing gateway tool can no longer newly enable flags reported as dangerous by openclaw security audit; perform high-risk flag changes through authenticated operator workflows instead.These are recent operationally important additions in the latest stable releases:
/tasks board (v2026.4.1) — users can inspect session background work and recent task status directly from chat.--tools, reducing blast radius for scheduled automations.openclaw flows.web_search.These are operationally important additions and hardening updates in newer stable releases:
openclaw exec-policy local command surface (v2026.4.12) — use show, preset, and set to keep tools.exec.* settings synchronized with local approvals policy files.models.providers.*.request.allowPrivateNetwork gives explicit opt-in for trusted self-hosted OpenAI-compatible endpoints.openai-codex/gpt-* models use Codex-managed auth, native threads, and model discovery; openai/gpt-* remains on the standard OpenAI provider path.These are operationally important additions and reliability/security fixes in the latest stable release:
opus aliases, Claude CLI defaults, and bundled image understanding now align to Claude Opus 4.7.google plugin now supports text-to-speech, voice selection, WAV output, and PCM telephony output.models.authStatus, cached 60 s) for expiring/expired token detection.memory-lancedb can now store durable indexes on remote object storage, not just local disk.agents.defaults.experimental.localModelLean: true drops heavyweight default tools (browser, cron, message) for weak local-model setups.skills.* writes and unknown-tool stream guard default enablement reduce Tool <name> not found loop failure modes.These are recent operationally important additions in current stable releases:
openclaw skills search|install|update now provides first-class ClawHub workflows from the core CLI.openclaw plugins install clawhub:<package> records source metadata for cleaner updates/uninstalls.openclaw cron add|edit --at ... --tz <iana> now honors requested local wall-clock time.openclaw channels login|logout auto-selects the single configured login-capable channel.openclaw plugins uninstall accepts installed clawhub: specs and versionless package names again, even when prior installs were pinned.openclaw doctor --fix prunes stale plugins.allow / plugins.entries refs after removals, and stale unknown plugins.allow ids no longer hard-fail recovery commands.Qwen (Alibaba Cloud Model Studio).openclaw --container <name-or-id> <command> and OPENCLAW_CONTAINER allow running OpenClaw CLI commands inside an active Docker/Podman container./v1/models and /v1/embeddings, and forwards explicit model overrides in /v1/chat/completions and /v1/responses.Options: lines auto-rendered as controls.@openclaw/msteams moves to the official Teams SDK with richer 1:1 streaming UX and message edit/delete support.These are recent operationally important additions in the latest stable releases:
openclaw flows list|show|cancel adds first-class visibility/control over detached background work.openclaw config schema (v2026.3.28) — prints the generated JSON schema for openclaw.json, which helps CI/config-lint workflows.mcp.servers can target HTTP/SSE endpoints with auth headers and safer credential redaction behavior.x_search integration (v2026.3.28) — bundled xAI provider uses Responses API with first-class x_search and onboarding/config wiring.apply_patch default enablement (v2026.3.28) — apply_patch is enabled by default on OpenAI/OpenAI Codex models with write-aligned sandbox policy./acp spawn ... --bind here workflows.requireApproval in before_tool_call lets plugins pause tool execution and request explicit approval.These are recent operationally important additions:
/fast toggle and params.fastMode support for Anthropic and OpenAI-compatible providers.sessions_yield lets orchestrators end the current turn and defer follow-up payloads cleanly.channelData.slack.blocks for rich Slack messages.GHSA-5wcw-8jjv-m286).GHSA-99qw-6mr3-36qr)./config and /debug checks, paired-device scope caps, stricter pre-auth WebSocket limits, and tighter Feishu/LINE/Zalo webhook validation (see security-checklist.md for GHSA-level details).These remain operationally important additions introduced in that release:
openclaw gateway status --require-rpc fails hard when RPC is unavailable or degraded (useful for automation/health gates).OPENCLAW_TZ pins gateway/CLI containers to a chosen IANA timezone in Docker setups."user" profile routing for signed-in browser sessions (chrome-relay assumptions were removed in v2026.3.22).tools.exec.security parser hardening.These are not breaking, but they are operationally important:
openclaw backup create and openclaw backup verify for local state archives and pre-change safety checks.talk.silenceTimeoutMs lets you tune when Talk mode auto-sends after silence.tools.web.search.brave.mode: "llm-context" enables extracted grounding snippets and metadata in web_search.openclaw acp --provenance off|meta|meta+receipt controls origin metadata and optional receipt injection.Always start troubleshooting with these:
# Quick status check
openclaw status
# Full diagnosis with logs
openclaw status --all
# Health check with provider probes
openclaw status --deep
# Automation-safe gateway probe (v2026.3.13+; unavailable/degraded => non-zero)
openclaw gateway status --require-rpc
# Validate config before restart
openclaw config validate
# Automated fixes
openclaw doctor --fix
# Security audit
openclaw security audit --deep
# Docker/K8s health probes (v2026.3.1+)
# GET /health, /healthz, /ready, /readyz
/health, /healthz, /ready, /readyz (v2026.3.1+)# 1. Install CLI
curl -fsSL https://openclaw.ai/install.sh | bash
# 2. Run onboarding wizard
openclaw onboard --install-daemon
# 3. Verify installation
openclaw status
openclaw health
# 4. Verify minimum safe version
# Must be v2026.3.1 or later
| Path | Purpose |
|---|---|
~/.openclaw/openclaw.json | Main configuration |
~/.openclaw/agents/<id>/ | Agent state and sessions |
~/.openclaw/credentials/ | Channel credentials |
~/.openclaw/workspace/ | Agent workspace |
~/.openclaw/skills/ | Installed skills (from ClawHub) |
~/.openclaw/extensions/ | Installed plugins |
~/.openclaw/secrets.json | SecretRef credential store |
/tmp/openclaw/ | Log files |
openclaw status --all before making changesopenclaw config validate before restarting the gatewaytools.profile: "messaging")openclaw status --all
openclaw health
openclaw gateway restart
# Via journalctl (systemd)
journalctl --user -u openclaw-gateway -f
# Log files
cat /tmp/openclaw/openclaw-$(date +%Y-%m-%d).log
# List pending
openclaw pairing list
# Approve
openclaw pairing approve <channel> <code>
# Interactive setup
openclaw configure
# Direct config
openclaw config set channels.<channel>.<setting> <value>
openclaw cron list
openclaw cron add --name "Job" --cron "0 8 * * *" --message "Task"
openclaw cron enable <id>
openclaw cron run <id> # Test run
# Create a full local state backup
openclaw backup create
# Config-only snapshot before targeted edits
openclaw backup create --only-config
# Verify an archive before restore/migration use
openclaw backup verify "<backup-file>"
# Preferred (v2026.3.22+)
openclaw skills search <query>
openclaw skills install <skill-slug>
openclaw skills update --all
# Compatibility path (older workflows)
clawhub install <skill-slug>
clawhub update --all
openclaw skills list
openclaw plugins install @openclaw/voice-call
openclaw plugins list
# Run a command against an active Docker/Podman OpenClaw container
openclaw --container openclaw-gateway status
# Optional default container target for repeated commands
export OPENCLAW_CONTAINER=openclaw-gateway
openclaw status --all
Defaults vary by install path in v2026.3.x (for example, local onboarding now falls back to "coding" in v2026.3.7). Set the profile explicitly based on your use case:
# Check current profile
openclaw config get agents.defaults.tools.profile
# For personal coding assistant
openclaw config set agents.defaults.tools.profile "coding"
# For full access (personal use only)
openclaw config set agents.defaults.tools.profile "full"
# Per-agent override (e.g., support bot stays messaging-only)
openclaw config set agents.list.support-bot.tools.profile "messaging"
# Allow agents to spawn sub-agents (default depth: 2)
openclaw config set agents.defaults.subagents.maxSpawnDepth 2
openclaw config set agents.defaults.subagents.maxChildrenPerAgent 5
For Anthropic models (Opus 4.6, Sonnet 4.6):
openclaw config set agents.defaults.params.context1m true
Claude 4.6 models now default to "adaptive" thinking level. Override if needed:
# Check current thinking level
openclaw config get agents.defaults.params.thinkingLevel
# Explicitly set (options: off, low, adaptive, high)
openclaw config set agents.defaults.params.thinkingLevel "adaptive"
Use lower-latency execution where supported by the active provider and model:
# Check current fast-mode default
openclaw config get agents.defaults.params.fastMode
# Enable fast mode by default for new turns/sessions
openclaw config set agents.defaults.params.fastMode true
Built-in PDF analysis with Anthropic and Google provider support:
# Set PDF model (defaults to agent's model; supports Anthropic and Google providers)
openclaw config set agents.defaults.pdfModel "<provider>/<model>"
# Set size limits
openclaw config set agents.defaults.pdfMaxBytesMb 50
openclaw config set agents.defaults.pdfMaxPages 200
# Isolate sessions per sender (recommended for multi-user)
openclaw config set session.dmScope "per-channel-peer"
# List active sessions
openclaw sessions list
# Clean up old sessions (respects disk budget)
openclaw sessions cleanup
# Set disk budget
openclaw config set session.maintenance.maxDiskBytes 1073741824
# Sub-agents can receive inline files at spawn time (base64 or utf8)
# Configurable via agents.defaults.sessionAttachments
# Validate config before restarting (catches invalid keys)
openclaw config validate
# Machine-readable output
openclaw config validate --json
# Print active config file path
openclaw config file
SecretRef system covers 64 credential targets with planning/apply/audit workflow:
# Plan secret changes
openclaw secrets plan
# Apply secrets
openclaw secrets apply
# Audit credential references
openclaw secrets audit
# Wait 1.5 seconds of silence before auto-send in Talk mode
openclaw config set talk.silenceTimeoutMs 1500
# Use Brave's LLM Context endpoint for richer grounding snippets
openclaw config set tools.web.search.brave.mode "llm-context"
# Include ACP ingress metadata and visible receipt text
openclaw acp --provenance meta+receipt
# Anthropic (recommended)
openclaw models auth setup-token --provider anthropic
# Kilo Code (v2026.2.23+)
openclaw models auth setup-token --provider kilocode
# Moonshot/Kimi (v2026.2.23+ — web search with citation extraction)
openclaw models auth setup-token --provider moonshot
# xAI / Grok (v2026.2.6+)
openclaw models auth setup-token --provider xai
# OpenAI (WebSocket-first transport in v2026.3.1+)
openclaw models auth setup-token --provider openai
# MiniMax (M2.7 catalog in v2026.3.28+)
openclaw models auth setup-token --provider minimax
# Vercel AI Gateway (v2026.2.23+ — accepts Claude shorthand model refs)
openclaw models auth setup-token --provider vercel-ai
# OpenAI Codex (v2026.4.12+ — Codex-managed auth and native threads; models: openai-codex/gpt-5.4)
openclaw models auth setup-token --provider openai-codex
# LM Studio (v2026.4.12+ — local/self-hosted OpenAI-compatible with runtime discovery and memory-search embeddings)
openclaw models auth setup-token --provider lmstudio
| Error | Cause | Fix |
|---|---|---|
missing_scope | Slack/channel OAuth scope missing | Add required scopes, reinstall app |
Gateway not reachable | Service not running | openclaw gateway restart |
Port 18789 in use | Another process on port | Check with openclaw gateway status |
Auth failed | Invalid API key/token | Re-run openclaw configure |
Pairing required | Unknown sender | openclaw pairing approve |
auth mode "none" | Removed in v2026.1.29 | openclaw config set gateway.auth.mode token |
OAuth token rejected | Anthropic blocked OpenClaw OAuth | Use openclaw models auth setup-token --provider anthropic |
spawn depth exceeded | Sub-agent depth limit reached | Increase agents.defaults.subagents.maxSpawnDepth |
WebSocket 1005/1006 | Discord resume logic (fixed in v2026.3.1) | Upgrade to v2026.3.1+, then restart |
invalid-config | Bad config keys | Run openclaw config validate --json for detailed error paths |
tools not available | tools.profile set to "messaging" | Set tools.profile to "coding" or "full" |
registerHttpHandler not a function | Plugin SDK v2026.3.2 breaking change | Migrate to api.registerHttpRoute() |
gateway.bind: loopback (local only)gateway.auth.mode: token (or trusted-proxy behind an identity-aware reverse proxy)gateway.mdns.mode: minimaltools.profile: "messaging" for multi-user / untrusted surfacesdmPolicy: pairing (require approval)groupPolicy: allowlistsandbox.mode: all (for untrusted users)sandbox.scope: agenttools.deny: ["gateway", "cron", "sessions_spawn", "sessions_send"]tools.exec.security: "deny" or "ask" for approval workflowssecurity.trust_model.multi_user_heuristic: true (v2026.2.24+, detects shared-user abuse)fs.workspaceOnly: true (restrict file access to workspace)These real-world workflows combine multiple features for common use cases:
openclaw onboard --install-daemon
openclaw config set agents.defaults.tools.profile "full"
openclaw models auth setup-token --provider <provider>
openclaw config set agents.defaults.model "<provider>/<model>"
openclaw config set agents.defaults.params.context1m true
openclaw config set agents.defaults.params.thinkingLevel "adaptive"
openclaw config set channels.whatsapp.dmPolicy pairing
openclaw config set channels.telegram.dmPolicy pairing
openclaw gateway restart
openclaw config set agents.defaults.tools.profile "messaging"
openclaw config set session.dmScope "per-channel-peer"
openclaw config set agents.defaults.sandbox.mode all
openclaw config set agents.defaults.sandbox.workspaceAccess ro
openclaw config set agents.defaults.tools.deny '["gateway","cron","sessions_spawn","sessions_send","exec"]'
openclaw config set security.trust_model.multi_user_heuristic true
openclaw config set gateway.bind "0.0.0.0"
openclaw config set gateway.auth.mode token
openclaw config set gateway.auth.token "$OPENCLAW_GATEWAY_TOKEN"
# Health probes: GET /health (liveness), GET /ready (readiness)
# Set resource limits via session disk budget
openclaw config set session.maintenance.maxDiskBytes 2147483648
openclaw cron add \
--name "Morning Digest" \
--cron "0 8 * * 1-5" \
--tz "America/New_York" \
--message "Summarize my unread messages across all channels and highlight action items" \
--channel slack \
--to "#daily-digest"
openclaw gateway stop
openclaw config set gateway.bind loopback
openclaw config set gateway.auth.token "$(openssl rand -hex 32)"
openclaw config set channels.slack.dmPolicy disabled
openclaw config set channels.whatsapp.dmPolicy disabled
openclaw security audit --deep --fix
openclaw secrets audit
openclaw gateway restart
When running on Windows WSL2:
powershell.exe -Command "wsl -d Ubuntu -e bash -l -c '...'" for commands/etc/wsl.confsource ~/.nvm/nvm.sh