Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Swarm reliability watchdog for OpenClaw — validates gateway/channel and every lane, performs bounded recovery, and emits auditable receipts.
Swarm reliability watchdog for OpenClaw — validates gateway/channel and every lane, performs bounded recovery, and emits auditable receipts.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
Use this skill when the user wants to: Diagnose why a multi-agent swarm feels "stuck" or partially offline Check gateway + channel + lane liveness in one run Perform bounded auto-recovery (restart + retry only) Capture auditable receipts for incident timelines Keep a primary watchdog lane plus a backup lane in place
# Install/refresh watchdog scripts + cron wiring bash skills/swarm-self-heal/scripts/setup.sh # Run an immediate canary check bash skills/swarm-self-heal/scripts/check.sh # Run watchdog directly (uses deployed workspace path) bash ~/.openclaw/workspace-studio/scripts/anvil_watchdog.sh # Optional: increase lane ping timeout for slower providers PING_TIMEOUT_SECONDS=180 bash ~/.openclaw/workspace-studio/scripts/anvil_watchdog.sh
Gateway health via openclaw health Channel readiness via openclaw channels status --json --probe Passive lane recency via openclaw status --json (latest OpenClaw-compatible) Active lane probe only when stale for main, builder-1, builder-2, reviewer, designer Bounded recovery with a single restart pass + targeted re-probe of infra failures
The watchdog output includes: timestamp targets ok_agents failed_agents actions VERDICT RECEIPT
Bounded recovery only (single restart pass per run) No destructive state wipes No blind reinstall behavior Recovery actions are explicit in output
Cron wiring sets both primary and backup watchdog lanes to xhigh thinking. Telegram target is auto-derived from config when available, with a safe fallback. Healthy runs can be summarized as a single line to reduce operator noise.
Agent frameworks, memory systems, reasoning layers, and model-native orchestration.
Largest current source with strong distribution and engagement signals.