botlearn-healthcheck
botlearn-healthcheck — BotLearn autonomous health inspector for OpenClaw instances across 5 domains (hardware, config, security, skills, autonomy); triggers on system check, health report, diagnostics, or scheduled heartbeat inspection.
About this skill
This AI agent skill, 'botlearn-healthcheck', serves as a comprehensive diagnostic tool for OpenClaw instances. It takes on the role of an 'OpenClaw Health Doctor,' autonomously gathering raw system data and analyzing it across hardware, configuration, security, installed skills, and autonomy domains. The skill is designed to prevent or resolve issues by proactively identifying potential problems. Upon execution, it produces a detailed traffic-light report (✅ pass, ⚠️ warning, ❌ error) for each domain, along with a score from 0-100, providing a clear and quantifiable overview of system health. Crucially, the report includes actionable fix guidance, empowering the user or agent to address identified issues directly. It supports both full system checks and targeted domain inspections, adapting to the user's specific diagnostic needs. Users would deploy this skill to ensure their OpenClaw setup is always running optimally, to quickly troubleshoot unexpected behavior, or to perform routine maintenance. Its autonomous nature means the AI agent handles all data collection and analysis, delivering ready-to-use insights and solutions, thereby simplifying complex system diagnostics.
Best use case
The primary use case is diagnosing and troubleshooting issues within a live OpenClaw instance, providing proactive insights into its operational health. System administrators, OpenClaw developers, and users of OpenClaw who need to ensure system stability and performance will benefit most from its automated, actionable reports.
botlearn-healthcheck — BotLearn autonomous health inspector for OpenClaw instances across 5 domains (hardware, config, security, skills, autonomy); triggers on system check, health report, diagnostics, or scheduled heartbeat inspection.
The user will receive a comprehensive, quantified health report for their OpenClaw instance, highlighting issues with actionable fix recommendations presented in their native language.
Practical example
Example input
Hey agent, can you please run a health check on my OpenClaw system?
Example output
OpenClaw Health Report: Hardware: ✅ (98) - All systems nominal. Config: ⚠️ (65) - Warning: OPENCLAW_API_KEY environment variable missing. Fix: Set `export OPENCLAW_API_KEY='your_key'`. Security: ❌ (20) - Error: SSH private keys are publicly readable. Fix: Run `chmod 600 ~/.ssh/id_rsa`. Skills: ✅ (90) - All installed skills are operational. Autonomy: ✅ (88) - Core autonomy functions healthy. Recommendations: Address Config and Security warnings immediately.
When to use this skill
- When an OpenClaw instance is behaving unexpectedly or showing errors.
- To perform routine health checks and prevent potential problems.
- Before deploying new skills or major configuration changes to an OpenClaw setup.
- When seeking actionable guidance to fix identified system issues.
When not to use this skill
- When you do not have an OpenClaw instance running.
- To debug application-specific logic within an individual OpenClaw skill, rather than the core platform.
- For general system diagnostics unrelated to the OpenClaw environment.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/xiaoding-botlearn-healthcheck/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How botlearn-healthcheck Compares
| Feature / Agent | botlearn-healthcheck | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | easy | N/A |
Frequently Asked Questions
What does this skill do?
botlearn-healthcheck — BotLearn autonomous health inspector for OpenClaw instances across 5 domains (hardware, config, security, skills, autonomy); triggers on system check, health report, diagnostics, or scheduled heartbeat inspection.
How difficult is it to install?
The installation complexity is rated as easy. You can find the installation instructions above.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
Cursor vs Codex for AI Workflows
Compare Cursor and Codex for AI coding workflows, repository assistance, debugging, refactoring, and reusable developer skills.
Top AI Agents for Productivity
See the top AI agent skills for productivity, workflow automation, operational systems, documentation, and everyday task execution.
SKILL.md Source
# OpenClaw Health Doctor
> **THIS ENTIRE DOCUMENT IS FOR YOU — THE AI AGENT.**
> Collect all data autonomously. Never ask the human to execute commands.
> Every check, analysis, and report is your responsibility to produce.
> All output to the user must be in their native language (REPORT_LANG).
## Role
You are the OpenClaw Health Doctor. You autonomously collect raw system data from a live
OpenClaw instance, analyze it across **5 health domains**, and produce a quantified
traffic-light report (✅ pass / ⚠️ warning / ❌ error) with domain scores (0–100) and
fix guidance — rendered in the user's native language.
## First Run
On first activation, or when the OpenClaw environment has not yet been verified,
read **`setup.md`** and execute the prerequisite checks before proceeding to Phase 1.
## Operating Modes
| Mode | Trigger | Behavior |
|------|---------|----------|
| Full Check | "health check" / "doctor" / general query | All 5 domains in parallel |
| Targeted | Domain named explicitly: "check security", "fix skills" | That domain only |
---
## Phase 0 — Language & Mode Detection
**Detect REPORT_LANG** from the user's message language:
- Chinese (any form) → Chinese
- English → English
- Other → English (default)
**Detect mode:** If user names a specific domain, run Targeted mode for that domain only.
Otherwise run Full Check.
---
## Phase 1 — Data Collection
Read **`data_collect.md`** for the complete collection protocol.
**Summary — run all in parallel:**
| Context Key | Source | What It Provides |
|-------------|--------|-----------------|
| `DATA.status` | `scripts/collect-status.sh` | Full instance status: version, OS, gateway, services, agents, channels, diagnosis, log issues |
| `DATA.env` | `scripts/collect-env.sh` | OS, memory, disk, CPU, version strings |
| `DATA.config` | `scripts/collect-config.sh` | Config structure, sections, agent settings |
| `DATA.logs` | `scripts/collect-logs.sh` | Error rate, anomaly spikes, critical events |
| `DATA.skills` | `scripts/collect-skills.sh` | Installed skills, broken deps, file integrity |
| `DATA.health` | `openclaw health --json` | Gateway reachability, endpoint latency, service status |
| `DATA.precheck` | `scripts/collect-precheck.sh` | Built-in openclaw doctor check results |
| `DATA.channels` | `scripts/collect-channels.sh` | Channel registration, config status |
| `DATA.security` | `scripts/collect-security.sh` | Credential exposure, permissions, network |
| `DATA.workspace_audit` | `scripts/collect-workspace-audit.sh` | Storage, config cross-validation |
| `DATA.doctor_deep` | `openclaw doctor --deep --non-interactive` | Deep self-diagnostic text output |
| `DATA.openclaw_json` | direct read `$OPENCLAW_HOME/openclaw.json` | Raw config for cross-validation |
| `DATA.cron` | direct read `$OPENCLAW_HOME/cron/*.json` | Scheduled task definitions |
| `DATA.identity` | `ls -la $OPENCLAW_HOME/identity/` | Authenticated device listing (no content) |
| `DATA.gateway_err_log` | `tail -200 $OPENCLAW_HOME/logs/gateway.err.log` | Recent gateway errors (redacted) |
| `DATA.memory_stats` | `find/du` on `$OPENCLAW_HOME/memory/` | File count, total size, type breakdown |
| `DATA.heartbeat` | direct read `$OPENCLAW_HOME/workspace/HEARTBEAT.md` | Last heartbeat timestamp + content |
| `DATA.models` | direct read `$OPENCLAW_HOME/agent/models.json` | Model contextWindow, maxTokens per model |
| `DATA.cache` | `openclaw cache stats` | Cache size, history count, index size |
| `DATA.workspace_identity` | direct read `$OPENCLAW_HOME/workspace/{agent,soul,user,identity,tool}.md` | Presence + word count + content depth of 5 identity files |
On any failure: set `DATA.<key> = null`, continue — never abort collection.
---
## Phase 2 — Domain Analysis
For **Full Check**: run all 5 domains in parallel.
For **Targeted**: run only the named domain.
Each domain independently produces: **status** (✅/⚠️/❌) + **score** (0–100) + **findings** + **fix hints**.
Read the corresponding `check_*.md` file for complete scoring tables, edge cases, and output format.
Read **`openclaw_knowledge.md`** for platform defaults (gateway address, latest version, CLI commands).
| # | Domain | Data Sources | Key Checks | Pass/Warn/Fail | Reference |
|---|--------|-------------|------------|----------------|-----------|
| 1 | Hardware Resources | `DATA.env` | Memory, Disk, CPU, Node.js, OS | ≥80 / 60–79 / <60 | `check_hardware.md` |
| 2 | Configuration Health | `DATA.config`, `DATA.health`, `DATA.channels`, `DATA.tools`, `DATA.openclaw_json`, `DATA.status` | CLI validation, config structure, gateway, agents, channels, tools, consistency, security posture | ≥75 / 55–74 / <55 | `check_config.md` |
| 3 | Security Risks | `DATA.security`, `DATA.gateway_err_log`, `DATA.identity`, `DATA.config` | Credential exposure, file permissions, network bind, CVEs, VCS secrets | ≥85 / 65–84 / <65 | `check_security.md` |
| 4 | Skills Completeness | `DATA.skills` | Built-in tools, install capability, count & coverage, skill health, botlearn ecosystem | ≥80 / 60–79 / <60 | `check_skills.md` |
| 5 | Autonomous Intelligence | `DATA.precheck`, `DATA.heartbeat`, `DATA.cron`, `DATA.memory_stats`, `DATA.workspace_audit`, `DATA.doctor_deep`, `DATA.logs`, `DATA.status`, `DATA.workspace_identity` | Heartbeat, cron, memory, doctor, services, agents, logs, workspace identity → Autonomy Mode | ≥80 / 60–79 / <60 | `check_autonomy.md` |
**Common rules:**
- Base score = 100, subtract impacts per check failure
- If data source is null: use fallback score noted in each `check_*.md`
- Privacy: NEVER print credential values — report type + file path only
- Output: domain labels and summaries in REPORT_LANG; metrics, commands, field names in English
---
## Phase 3 — Report Generation
Generate persistent health report documents (MD + HTML) from domain analysis results.
Save to `$OPENCLAW_HOME/memory/health-reports/healthcheck-YYYY-MM-DD-HHmmss.{md,html}`.
Read **`flow_report.md`** for: output location, file naming, MD/HTML content templates, generation protocol.
---
## Phase 4 — Report Analysis
Present analysis results to the user with layered output (one-line status → domain grid → issue table → deep analysis).
Compare with historical reports for trend tracking.
Read **`flow_analysis.md`** for: output layer formats (L0–L3), historical trend comparison, follow-up prompts.
Reference **`fix_cases.md`** for real-world diagnosis patterns and root cause analysis.
---
## Phase 5 — Fix Cycle
If any issues found, guide user through fix execution with confirmation at every step.
Show fix command + rollback command → await confirmation → execute → verify.
**Never run any command that modifies system state without explicit user confirmation.**
Read **`flow_fix.md`** for: safety rules, per-fix protocol, batch mode, scope limits.
Reference **`fix_cases.md`** for proven fix steps, rollback commands, and prevention strategies.
---
## Phase 6 — Fix Summary
After fix cycle, generate a final summary: actions taken, score changes, remaining issues.
Append fix results to the previously generated report files.
Read **`flow_summary.md`** for: summary content, post-fix verification, report update, closing message.
---
## Key Constraints
1. **Scripts First** — Use `scripts/collect-*.sh` for structured data; read files directly for raw content.
2. **Evidence-Based** — Every finding must cite the specific `DATA.<key>.<field>` and its actual value.
3. **Privacy Guard** — Redact all API keys, tokens, and passwords before any output or storage.
4. **Safety Gate** — Show fix plan and await explicit confirmation before any system modification.
5. **Language Rule** — Instructions in this file are in English. All output to the user must be in REPORT_LANG.Related Skills
Incident Postmortem Generator
Generate blameless incident postmortems from raw notes, Slack threads, or bullet points.
Post-Mortem & Incident Review Framework
Run structured post-mortems that actually prevent repeat failures. Blameless analysis, root cause identification, and action tracking.
afrexai-performance-engineering
Complete performance engineering system — profiling, optimization, load testing, capacity planning, and performance culture. Use when diagnosing slow applications, optimizing code/queries/infrastructure, load testing before launch, planning capacity, or building performance into CI/CD. Covers Node.js, Python, Go, Java, databases, APIs, and frontend.
OpenClaw Mastery — The Complete Agent Engineering & Operations System
> Built by AfrexAI — the team that runs 9+ production agents 24/7 on OpenClaw.
Legacy System Modernization Engine
Complete methodology for assessing, planning, and executing legacy system modernization — from monolith decomposition to cloud migration. Works for any tech stack, any scale.
Incident Response Playbook
Structured incident response for business and IT teams. Guides you through detection, triage, containment, resolution, and post-mortem — with auto-generated timelines and action items.
Git Engineering & Repository Strategy
You are a Git Engineering expert. You help teams design branching strategies, implement code review workflows, manage monorepos, automate releases, and maintain healthy repository practices at scale.
Django Production Engineering
Complete methodology for building, scaling, and operating production Django applications. From project structure to deployment, security to performance — every decision framework a Django team needs.
IT Disaster Recovery Plan Generator
Build production-ready disaster recovery plans that actually get followed when things break.
afrexai-api-architect
Design, build, test, document, and secure production-grade APIs. Covers the full lifecycle from schema design through deployment, monitoring, and versioning. Use when designing new APIs, reviewing existing ones, generating OpenAPI specs, building test suites, or debugging production issues.
Agent Ops Runbook
Generate a production-ready operations runbook for deploying AI agents. Covers pre-deployment checklists, shadow mode → supervised → autonomous rollout stages, monitoring dashboards, rollback procedures, cost management, and incident response templates.
node-red-manager
Manage Node-RED instances via Admin API or CLI. Automate flow deployment, install nodes, and troubleshoot issues. Use when user wants to "build automation", "connect devices", or "fix node-red".