Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Release skills to ClawhHub through the full publication pipeline — auto-scaffolding, OPSEC scan, dual review (agent + user), force-push release, security sca...
Release skills to ClawhHub through the full publication pipeline — auto-scaffolding, OPSEC scan, dual review (agent + user), force-push release, security sca...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Orchestrates the full skill publication pipeline from internal repo to ClawhHub.
User says "release {skill}" or "publish {skill} to clawhub" User says "prepare {skill} for release" or "check release readiness" User says "review {skill} for publication" Cron-triggered release check during refactory pipeline
How OpenClaw and user interact during release: Agent runs on a machine with shell access (exec tool) for git and CLI operations User communicates via messaging channel (Telegram, Discord, Signal, etc.) — likely on a phone User reviews the private GitHub repo directly in their browser/phone — the repo IS the review artifact, not a text summary User approves or rejects by replying to the agent's message (natural language: "approve", "revise: fix the readme", "reject") Agent can create and manage GitHub repos via gh CLI on behalf of the user's authenticated account Agent pushes to the private staging repo BEFORE requesting user review, so there is something to review Agent does NOT publish anything publicly without explicit user approval — this is a hard gate The repo starts private for staging and review. At release time, history is erased via orphan branch + force push (single clean commit), then flipped to public The full release can span multiple sessions — the private staging repo preserves state so any agent can resume Multiple skills can be in different stages of the pipeline simultaneously
gh CLI authenticated (for repo creation and visibility changes) clawhub CLI installed (for ClawhHub publishing) A skill directory with at least a SKILL.md file
This skill handles: The full release pipeline — structure scaffolding, OPSEC scanning, review, publishing. This skill does NOT handle: Skill content creation or design. The SKILL.md must already describe what the skill does. Everything else (boilerplate, structure, scaffolding) is this pipeline's job. A user with a finished SKILL.md should be able to say "release this skill" and this skill handles everything from there — including generating all missing structure files.
The pipeline has two fully automated phases separated by one human gate. Both single and batch releases follow the same model.
Phase 1 (AUTO): Steps 1-7 — scaffold, validate, stage, scan, review, push ↓ GATE: User reviews private repo, replies "approve" / "revise" / "reject" ↓ Phase 2 (AUTO): Steps 9-12 — erase history, flip public, publish, verify scan, deliver
Phase 1 (PARALLEL): Spawn subagents — one per skill, all run Phase 1 simultaneously ↓ GATE: ONE batch review message with all repo links User replies: "approve all" / "approve A,C; revise B: fix readme" ↓ Phase 2 (PARALLEL): Spawn subagents for approved skills, all publish simultaneously ↓ DELIVERY: ONE batch summary with all links and scan results Batch rules: Never serialize releases — spawn parallel subagents for Phase 1 Never block on one approval to start the next Phase 1 Assign each skill a short unique ID (A, B, C...) in the batch review message Collect all Phase 1 results, present ONE batch review message with short IDs Accept batch approvals: "approve all" / "approve A,C" / "revise B: fix readme" Run all Phase 2s in parallel after approval Design principles: User says "release these skills" once. Agent runs all Phase 1s in parallel without interruption. Agent sends ONE message: all review links + recommendations. Then waits. User replies once. Agent runs all Phase 2s in parallel without interruption. Agent sends ONE delivery message with all results. If any step fails, agent fixes it automatically and continues. Only report to user if unfixable. Rate limits, retries, and delays are handled silently (sleep + retry, not "rate limited, should I try again?") Anti-patterns (never do these): Do not serialize releases — always parallelize with subagents Do not block on approval for skill A before starting Phase 1 for skill B Do not send per-skill review messages — batch them Do not ask "should I create the repo?" — just create it Do not report intermediate steps — only the batch review and batch delivery Do not ask about rate limits or transient errors — retry silently
Before any quality checks, generate all missing structure files from the existing SKILL.md: Auto-generate if missing: FileSourceGeneration Methodskill.ymlSKILL.md frontmatter + triggersExtract name, description, version, triggers from SKILL.mdREADME.mdSKILL.md description + usageGitHub landing page for humans: what it does, how to install, future work. NOT agent instructions.CHANGELOG.mdVersion from skill.yml + git log## v{version} — {date} + summary of current statetests/test-triggers.jsonSKILL.md triggers + "When to Use"shouldTrigger from triggers list, shouldNotTrigger from anti-patternsscripts/Create directoryEmpty dir or placeholder README if no scripts neededreferences/Create directoryEmpty dir or placeholder README if no references neededLICENSEDefault MITStandard MIT license text.gitignoreStandardnode_modules/, .DS_Store, *.log Rules: Never overwrite existing files — only generate what's missing All generated content derives from SKILL.md — no hallucinated features If SKILL.md lacks enough info to generate a file, flag it as a content gap (user must fix SKILL.md first) Generated README.md must make sense to a stranger who has never seen the skill before Validation after scaffolding: Run scripts/validate-structure.sh — must score 8/8 If not 8/8, identify what's still missing and fix it
If this skill has been published before, bump the version before proceeding: Check current published version: clawhub inspect {slug} Bump version in both skill.yml and SKILL.md frontmatter: Patch (1.0.0 → 1.0.1): bug fixes, typos, minor doc updates Minor (1.0.0 → 1.1.0): new features, new sections, structural changes Major (1.0.0 → 2.0.0): breaking changes, full rewrites Update CHANGELOG.md with new version entry describing what changed Verify display_name is set in skill.yml — this is the human-readable title shown on ClawhHub. It must be set explicitly; never derive it from the slug or guess it. If missing, add it now: display_name: "Human Readable Title" # Required — used as ClawhHub listing title Rules: Title case, plain English, no jargon Describes what the skill does, not how it's implemented Example: slug autonomous-task-runner → display_name: "Autonomous Task Runner" Example: slug skill-releaser → display_name: "Skill Releaser" Skip this step for first-time releases (but still verify display_name exists).
Verify the skill directory is complete: SKILL.md exists with description and usage instructions skill.yml exists with name, description, triggers Structure score 8/8 (from Step 1) No obvious OPSEC violations (quick scan) If any check fails, report what needs fixing. Do not proceed.
# Check if repo already exists gh repo view your-org/openclaw-skill-{name} 2>/dev/null # If not, create it — CRITICAL: use the SANITIZED description, not the source skill.yml # Run OPSEC scan on the description string BEFORE passing to gh repo create gh repo create your-org/openclaw-skill-{name} --private --description "{sanitized description}" OPSEC on repo metadata: The description passed to gh repo create is public when the repo flips to public. It must be scanned for the same patterns as file contents (org names, personal info, internal project names). This is not covered by file-based scanners — it must be checked explicitly.
Copy ONLY the skill directory content to a clean staging area: mkdir -p /tmp/skill-release-{name} cp -r skills/{name}/* /tmp/skill-release-{name}/ # Remove internal-only files rm -f /tmp/skill-release-{name}/WORKSPACE.md rm -f /tmp/skill-release-{name}/.gitignore rm -rf /tmp/skill-release-{name}/_meta.json rm -rf /tmp/skill-release-{name}/.clawhub CRITICAL VALIDATION — verify before proceeding: # The release directory must contain ONLY skill files. # If you see ANY of these, you copied from the wrong directory — STOP and fix: # - USER.md, MEMORY.md, AGENTS.md, SOUL.md (workspace/repo root files) # - audits/, shared/, scripts/ (repo directories) # - memory/, slides/, projects/ (personal data) # - .gitmodules (repo root) ls /tmp/skill-release-{name}/ # Expected: SKILL.md, skill.yml, README.md, CHANGELOG.md, LICENSE, tests/, references/, scripts/ # If file count exceeds ~15 files, something is wrong. Verify source path. Add release files if missing: LICENSE (MIT by default) README.md (must work as GitHub landing page for strangers) .gitignore
bash scripts/validate-release-content.sh /tmp/skill-release-{name} This is a deterministic script that blocks pushes if the release directory contains repo-level files (USER.md, MEMORY.md, audits/, etc.), has too many files (>50), or contains suspicious file types (logs, images, PDFs). Must return SAFE (exit 0). If BLOCKED, you copied from the wrong directory. Do NOT proceed. Fix the source path and re-copy.
bash scripts/opsec-scan.sh /tmp/skill-release-{name} Must return CLEAN (exit 0). If violations found, fix them in the release copy. Do NOT modify the source in openclaw-knowledge — keep the internal version as-is.
Push sanitized content so user can review the actual repo on any device (phone, laptop): cd /tmp/skill-release-{name} git init git config user.email "agent@localhost" git config user.name "SkillEngineer" # Install OPSEC pre-commit hook — prevents sensitive data from entering git history cp /tmp/openclaw-knowledge/scripts/opsec-precommit-hook.sh .git/hooks/pre-commit chmod +x .git/hooks/pre-commit git add . git commit -m "v{version}: Initial release of {name}" git remote add origin https://github.com/your-org/openclaw-skill-{name}.git git branch -M main git push -u origin main
For single skills, send review link. For batch releases, collect all Phase 1 results and send ONE message. Single skill: RELEASE REVIEW: {skill-name} {score} | OPSEC: CLEAN {1-line description} https://github.com/your-org/openclaw-skill-{name} Reply: approve / revise:{feedback} / reject Batch review (assign short IDs for easy approval): BATCH RELEASE REVIEW — {N} skills A. {skill-name} — {score} | CLEAN | {1-line description} https://github.com/your-org/openclaw-skill-{name} B. {skill-name} — {score} | CLEAN | {1-line description} https://github.com/your-org/openclaw-skill-{name} C. {skill-name} — {score} | CLEAN | {1-line description} https://github.com/your-org/openclaw-skill-{name} Reply: approve all / approve A,C / revise B:{feedback} Rules: Links on their own line (never in tables — not clickable on mobile) Short IDs (A, B, C) for batch approval — user should never type full skill names The repo IS the review artifact. User reviews actual files, not a summary. Wait for user response. Do not proceed without explicit approval.
Erase git history (may contain OPSEC fixes from earlier revisions) and make the repo public: cd /tmp/skill-release-{name} # Orphan branch erases all history git checkout --orphan clean git add -A git commit -m "v{version}: {name}" git branch -D main git branch -m main git push -f origin main # Flip visibility gh repo edit your-org/openclaw-skill-{name} --visibility public # Verify repo metadata is OPSEC-clean (description, topics are now public) gh repo view your-org/openclaw-skill-{name} --json description,repositoryTopics -q '.description + " " + (.repositoryTopics | join(" "))' # Manually check output for org names, personal info, internal project names # If dirty: gh repo edit your-org/openclaw-skill-{name} --description "{clean description}" Single commit, clean history, one repo. No dual-repo complexity.
ClawhHub publish is an irreversible external action. It requires explicit user approval via a D-## ID before execution. Extract the publish parameters and log an approval request — do NOT run clawhub publish yet: # Extract publish parameters directly from skill.yml SLUG=$(grep '^name:' /tmp/skill-release-{name}/skill.yml | awk '{print $2}') DISPLAY_NAME=$(grep '^display_name:' /tmp/skill-release-{name}/skill.yml | sed 's/display_name: *//' | tr -d '"') VERSION=$(grep '^version:' /tmp/skill-release-{name}/skill.yml | awk '{print $2}') echo "slug: $SLUG" echo "display_name: $DISPLAY_NAME" echo "version: $VERSION" if [ -z "$SLUG" ] || [ -z "$DISPLAY_NAME" ] || [ -z "$VERSION" ]; then echo "ERROR: Missing slug, display_name, or version in skill.yml — fix before proceeding" exit 1 fi If display_name is missing from skill.yml, add it now (see Step 1.5). Then add a pending publish entry to ESCALATIONS.md: D-##: Publish {display_name} v{version} (slug: {slug}) to ClawhHub? — yes/no Stop here. Wait for My Lord to reply "D-## yes" before proceeding to Step 11.5. Only proceed to Step 11.5 if My Lord has explicitly approved this specific publish in the current session.
Only run this step after receiving explicit "D-## yes" from My Lord. clawhub publish /tmp/skill-release-{name} \ --slug "$SLUG" \ --name "$DISPLAY_NAME" \ --version "$VERSION" \ --changelog "{summary of changes from CHANGELOG.md}" Post-publish verification — verify the live listing matches skill.yml exactly: After publishing, verify the live listing matches the source skill.yml exactly. This step catches wrong titles, version mismatches, and stale metadata before delivery. clawhub inspect "$SLUG" 2>&1 Compare the output against skill.yml: FieldExpected (from skill.yml)Actual (from clawhub inspect)Match?Display namedisplay_name valueFirst line of inspect output✅ / ❌Versionversion valueLatest: field✅ / ❌DescriptionFirst sentence of descriptionSummary: field (truncated)✅ / ❌Owneryour ClawhHub usernameOwner: field✅ / ❌ If any field does not match: Do NOT proceed to Step 12 Identify the mismatch (wrong --name, wrong --slug, stale skill.yml) Fix the source (skill.yml or publish command), bump patch version, republish Re-run Step 11.5 until all fields match Only proceed to Step 12 when the table shows ✅ on all rows Common mismatches and fixes: MismatchCauseFixWrong display namedisplay_name missing from skill.yml; name was guessedAdd display_name to skill.yml, republishWrong versionskill.yml not updated before publishBump version in skill.yml, republishWrong slugname field in skill.yml doesn't match intended slugFix name in skill.yml or use correct --slugWrong ownerPublished under wrong accountCheck clawhub whoami, re-authenticate if needed
ClawhHub automatically scans all published skills via VirusTotal (Code Insight) and OpenClaw's own scanner. Do not consider the release complete until scans are reviewed. Use the browser tool to check scan results — ClawhHub pages require JS rendering: Open the skill detail page with browser: browser start (profile=openclaw) browser navigate → https://clawhub.ai/{username}/{slug} browser snapshot (refs=aria) Find the "Security Scan" section in the snapshot. It shows: VirusTotal verdict: Benign / Suspicious / Malicious / Pending OpenClaw verdict: Benign / Suspicious / Malicious with confidence level Detail text: Explanation of what was flagged (expand "Details" if collapsed) VirusTotal report link: Direct URL to full analysis Interpret results and act: VerdictMeaningActionBenign (both)Clean, auto-approvedProceed to Step 13PendingStill processingWait 2 minutes, re-snapshotSuspicious (undeclared permissions)Skill needs privileged access not in metadataAdd permissions to skill.yml, bump version, re-publishSuspicious (other)Flagged behaviorReview detail text. If false positive, contact OpenClaw security team. If real, fix and re-publishMaliciousBlocked from downloadFix immediately, bump version, re-run from Step 1.5 Common fix — undeclared permissions: If flagged for privileged CLI access (gh, clawhub, git, filesystem), add a permissions field to skill.yml: permissions: - exec: git, gh CLI (repo creation, visibility changes) - exec: clawhub CLI (publishing) - filesystem: read/write skill directories - browser: verify scan results on ClawhHub Then bump version and re-publish. This declares intent and resolves the flag. If VirusTotal is still Pending after 5 minutes, proceed to Step 12 but note it in the delivery. The scan completes asynchronously.
Confirm the release is live and deliver all links and scan status to the user: RELEASED: {skill-name} v{version} GitHub: https://github.com/your-org/openclaw-skill-{name} ClawhHub: https://clawhub.ai/{username}/{slug} VirusTotal: {verdict} — {report link} OpenClaw Scan: {verdict} ({confidence}) {1-line description}
Skill-releaser scope ends at Step 13 (delivery). Post-release bookkeeping (STATUS.json updates, submodule conversion, memory logging) is a refactory system responsibility, not a release pipeline responsibility. See REFACTORY-SYSTEM.md "Post-Release Stage."
ErrorCauseFixReadiness check failsScore too low or OPSEC dirtyComplete refactoring firstOPSEC scan finds violations in release copySanitization incompleteFix in release copy, re-scangh repo create failsAuth issue or name takenCheck gh auth status, try different nameclawhub publish failsCLI not installed or authRun npm install -g clawhub, authenticateUser rejectsFeedback providedAddress feedback, restart from Step 4
No persistent configuration required. The pipeline uses environment-level tools (gh, clawhub, git) that must be authenticated before use. Required tools: ToolPurposeCheckgh CLIGitHub repo creation, visibility changesgh auth statusclawhub CLIPublish to ClawhHub registryclawhub whoamigitVersion controlBuilt-inpython3OPSEC scanner (optional)python3 --version Pipeline scripts (in scripts/): ScriptPurposevalidate-structure.shScore skill structure completeness (8 checks)validate-release-content.shBlock placeholder text, empty filesopsec-scan.shScan for sensitive data before public release Org/username: Update your-org in the pipeline steps to your GitHub username or org. The clawhub --slug argument uses the skill's name field from skill.yml.
Release a specific skill: "Release skill-engineer to clawhub" Check readiness without releasing: "Is evidence-based-investigation ready for release?" Batch readiness check: "Which skills are ready to publish?"
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.