← All skills
Tencent SkillHub Β· Developer Tools

sys-updater

System package maintenance for Ubuntu (apt), npm, brew, and OpenClaw skills. Conservative workflow with 2-day quarantine for non-security updates, automatic...

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

System package maintenance for Ubuntu (apt), npm, brew, and OpenClaw skills. Conservative workflow with 2-day quarantine for non-security updates, automatic...

⬇ 0 downloads β˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
CLAUDE.md, README.md, SKILL.md, docs/AUTO_REVIEW.md, docs/REFACTOR-PLAN-2026-02-19.md, docs/extending.md

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.1.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 16 sections Open source page

System Updater (sys-updater)

Comprehensive system maintenance automation for Ubuntu hosts with support for apt, npm, brew, and OpenClaw skills.

What this skill does

sys-updater is a conservative maintenance pipeline for Linux hosts running OpenClaw. It separates security patching from feature upgrades, keeps auditable state files, and sends a human-readable daily report.

Core capabilities

APT (Ubuntu) daily apt-get update automatic security updates via unattended-upgrade non-security upgrades only from explicit planned list NPM / PNPM / Brew detect outdated packages keep them in tracked state auto-review package risk (bugs/regressions/CVE signals) install only approved/planned updates OpenClaw skills (ClawHub) checks installed skills and reports update status Daily report (09:00 MSK) current health/status candidates/planned/blocked per manager explicit β€œactually installed” lines for apt/npm/pnpm/brew

Daily (06:00 MSK)

run_6am: β”œβ”€β”€ apt: update, security upgrades, simulate, track non-security β”œβ”€β”€ npm/brew: check outdated, add to tracking └── skills: auto-update immediately (no quarantine)

Report (09:00 MSK)

Summary of all package managers Planned updates for next day Blocked packages with reasons

T+2 Days (Review)

Web search for bugs/regressions in tracked packages Mark as planned or blocked based on findings

T+3 Days (Upgrade)

Apply planned npm/brew upgrades Send completion report

State Files

state/apt/last_run.json β€” Last run results state/apt/tracked.json β€” APT packages being tracked state/apt/npm_tracked.json β€” NPM packages state/apt/brew_tracked.json β€” Brew packages state/logs/apt_maint.log β€” Daily logs (10-day rotation)

Manual Commands

# Daily maintenance (runs automatically) ./scripts/apt_maint.py run_6am # Generate report ./scripts/apt_maint.py report_9am # Check npm/brew only ./scripts/pkg_maint.py check # Review packages (after 2 days) ./scripts/pkg_maint.py review # Apply planned upgrades ./scripts/pkg_maint.py upgrade # Update skills only ./scripts/pkg_maint.py skills

Configuration

Environment variables: SYS_UPDATER_BASE_DIR β€” Base directory (default: ~/clawd/sys-updater) SYS_UPDATER_STATE_DIR β€” State files location SYS_UPDATER_LOG_DIR β€” Log files location

Cron Jobs

Requires 4 cron jobs: run_6am β€” Daily 06:00 MSK (apt + check npm/brew + auto skills) report_9am β€” Daily 09:00 MSK (Telegram report) review_2d β€” T+2 days 09:00 MSK (web search bugs) upgrade_3d β€” T+3 days 06:00 MSK (apply planned)

Conservative Design

Security updates: Applied automatically via unattended-upgrade Non-security: 2-day observation period with bug research User control: Can block any package with reason Safety: Dry-run simulation before any apt upgrade

Requirements

Ubuntu with apt Node.js + npm (for npm packages) Homebrew (for brew packages) OpenClaw with clawhub CLI sudo access for specific apt commands (see below)

Sudoers Configuration

For unattended operation, grant the running user passwordless sudo for specific apt commands only. Do not add the user to full sudoers. Create file /etc/sudoers.d/sys-updater: # Allow sys-updater to run apt maintenance commands without password # Replace 'username' with your actual username username ALL=(root) NOPASSWD: /usr/bin/apt-get update username ALL=(root) NOPASSWD: /usr/bin/apt-get -s upgrade username ALL=(root) NOPASSWD: /usr/bin/unattended-upgrade -d Set secure permissions: sudo chmod 440 /etc/sudoers.d/sys-updater sudo visudo -c # Verify syntax is valid

Required Commands Explained

CommandPurposeapt-get updateRefresh package listsapt-get -s upgradeSimulate upgrade (dry-run, no actual changes)unattended-upgrade -dApply security updates automatically

Security Notes

Only these 3 specific commands are allowed No apt-get upgrade without -s (simulation only for tracking) No apt-get dist-upgrade or autoremove No package installation/removal through sudo NPM and brew do not require sudo (user installs)

Category context

Code helpers, APIs, CLIs, browser automation, testing, and developer operations.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
6 Docs
  • SKILL.md Primary doc
  • CLAUDE.md Docs
  • docs/AUTO_REVIEW.md Docs
  • docs/extending.md Docs
  • docs/REFACTOR-PLAN-2026-02-19.md Docs
  • README.md Docs