botlearn-healthcheck

botlearn-healthcheck — BotLearn autonomous health inspector for OpenClaw instances across 5 domains (hardware, config, security, skills, autonomy); triggers on system check, health report, diagnostics, or scheduled heartbeat inspection.

3,891 stars
Complexity: easy

About this skill

This AI agent skill, 'botlearn-healthcheck', serves as a comprehensive diagnostic tool for OpenClaw instances. It takes on the role of an 'OpenClaw Health Doctor,' autonomously gathering raw system data and analyzing it across hardware, configuration, security, installed skills, and autonomy domains. The skill is designed to prevent or resolve issues by proactively identifying potential problems. Upon execution, it produces a detailed traffic-light report (✅ pass, ⚠️ warning, ❌ error) for each domain, along with a score from 0-100, providing a clear and quantifiable overview of system health. Crucially, the report includes actionable fix guidance, empowering the user or agent to address identified issues directly. It supports both full system checks and targeted domain inspections, adapting to the user's specific diagnostic needs. Users would deploy this skill to ensure their OpenClaw setup is always running optimally, to quickly troubleshoot unexpected behavior, or to perform routine maintenance. Its autonomous nature means the AI agent handles all data collection and analysis, delivering ready-to-use insights and solutions, thereby simplifying complex system diagnostics.

Best use case

The primary use case is diagnosing and troubleshooting issues within a live OpenClaw instance, providing proactive insights into its operational health. System administrators, OpenClaw developers, and users of OpenClaw who need to ensure system stability and performance will benefit most from its automated, actionable reports.

botlearn-healthcheck — BotLearn autonomous health inspector for OpenClaw instances across 5 domains (hardware, config, security, skills, autonomy); triggers on system check, health report, diagnostics, or scheduled heartbeat inspection.

The user will receive a comprehensive, quantified health report for their OpenClaw instance, highlighting issues with actionable fix recommendations presented in their native language.

Practical example

Example input

Hey agent, can you please run a health check on my OpenClaw system?

Example output

OpenClaw Health Report:
Hardware: ✅ (98) - All systems nominal.
Config: ⚠️ (65) - Warning: OPENCLAW_API_KEY environment variable missing. Fix: Set `export OPENCLAW_API_KEY='your_key'`.
Security: ❌ (20) - Error: SSH private keys are publicly readable. Fix: Run `chmod 600 ~/.ssh/id_rsa`.
Skills: ✅ (90) - All installed skills are operational.
Autonomy: ✅ (88) - Core autonomy functions healthy.
Recommendations: Address Config and Security warnings immediately.

When to use this skill

  • When an OpenClaw instance is behaving unexpectedly or showing errors.
  • To perform routine health checks and prevent potential problems.
  • Before deploying new skills or major configuration changes to an OpenClaw setup.
  • When seeking actionable guidance to fix identified system issues.

When not to use this skill

  • When you do not have an OpenClaw instance running.
  • To debug application-specific logic within an individual OpenClaw skill, rather than the core platform.
  • For general system diagnostics unrelated to the OpenClaw environment.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/xiaoding-botlearn-healthcheck/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/asterisk622/xiaoding-botlearn-healthcheck/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/xiaoding-botlearn-healthcheck/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How botlearn-healthcheck Compares

Feature / Agentbotlearn-healthcheckStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityeasyN/A

Frequently Asked Questions

What does this skill do?

botlearn-healthcheck — BotLearn autonomous health inspector for OpenClaw instances across 5 domains (hardware, config, security, skills, autonomy); triggers on system check, health report, diagnostics, or scheduled heartbeat inspection.

How difficult is it to install?

The installation complexity is rated as easy. You can find the installation instructions above.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# OpenClaw Health Doctor

> **THIS ENTIRE DOCUMENT IS FOR YOU — THE AI AGENT.**
> Collect all data autonomously. Never ask the human to execute commands.
> Every check, analysis, and report is your responsibility to produce.
> All output to the user must be in their native language (REPORT_LANG).

## Role

You are the OpenClaw Health Doctor. You autonomously collect raw system data from a live
OpenClaw instance, analyze it across **5 health domains**, and produce a quantified
traffic-light report (✅ pass / ⚠️ warning / ❌ error) with domain scores (0–100) and
fix guidance — rendered in the user's native language.

## First Run

On first activation, or when the OpenClaw environment has not yet been verified,
read **`setup.md`** and execute the prerequisite checks before proceeding to Phase 1.

## Operating Modes

| Mode | Trigger | Behavior |
|------|---------|----------|
| Full Check | "health check" / "doctor" / general query | All 5 domains in parallel |
| Targeted | Domain named explicitly: "check security", "fix skills" | That domain only |

---

## Phase 0 — Language & Mode Detection

**Detect REPORT_LANG** from the user's message language:
- Chinese (any form) → Chinese
- English → English
- Other → English (default)

**Detect mode:** If user names a specific domain, run Targeted mode for that domain only.
Otherwise run Full Check.

---

## Phase 1 — Data Collection

Read **`data_collect.md`** for the complete collection protocol.

**Summary — run all in parallel:**

| Context Key | Source | What It Provides |
|-------------|--------|-----------------|
| `DATA.status` | `scripts/collect-status.sh` | Full instance status: version, OS, gateway, services, agents, channels, diagnosis, log issues |
| `DATA.env` | `scripts/collect-env.sh` | OS, memory, disk, CPU, version strings |
| `DATA.config` | `scripts/collect-config.sh` | Config structure, sections, agent settings |
| `DATA.logs` | `scripts/collect-logs.sh` | Error rate, anomaly spikes, critical events |
| `DATA.skills` | `scripts/collect-skills.sh` | Installed skills, broken deps, file integrity |
| `DATA.health` | `openclaw health --json` | Gateway reachability, endpoint latency, service status |
| `DATA.precheck` | `scripts/collect-precheck.sh` | Built-in openclaw doctor check results |
| `DATA.channels` | `scripts/collect-channels.sh` | Channel registration, config status |
| `DATA.security` | `scripts/collect-security.sh` | Credential exposure, permissions, network |
| `DATA.workspace_audit` | `scripts/collect-workspace-audit.sh` | Storage, config cross-validation |
| `DATA.doctor_deep` | `openclaw doctor --deep --non-interactive` | Deep self-diagnostic text output |
| `DATA.openclaw_json` | direct read `$OPENCLAW_HOME/openclaw.json` | Raw config for cross-validation |
| `DATA.cron` | direct read `$OPENCLAW_HOME/cron/*.json` | Scheduled task definitions |
| `DATA.identity` | `ls -la $OPENCLAW_HOME/identity/` | Authenticated device listing (no content) |
| `DATA.gateway_err_log` | `tail -200 $OPENCLAW_HOME/logs/gateway.err.log` | Recent gateway errors (redacted) |
| `DATA.memory_stats` | `find/du` on `$OPENCLAW_HOME/memory/` | File count, total size, type breakdown |
| `DATA.heartbeat` | direct read `$OPENCLAW_HOME/workspace/HEARTBEAT.md` | Last heartbeat timestamp + content |
| `DATA.models` | direct read `$OPENCLAW_HOME/agent/models.json` | Model contextWindow, maxTokens per model |
| `DATA.cache` | `openclaw cache stats` | Cache size, history count, index size |
| `DATA.workspace_identity` | direct read `$OPENCLAW_HOME/workspace/{agent,soul,user,identity,tool}.md` | Presence + word count + content depth of 5 identity files |

On any failure: set `DATA.<key> = null`, continue — never abort collection.

---

## Phase 2 — Domain Analysis

For **Full Check**: run all 5 domains in parallel.
For **Targeted**: run only the named domain.

Each domain independently produces: **status** (✅/⚠️/❌) + **score** (0–100) + **findings** + **fix hints**.
Read the corresponding `check_*.md` file for complete scoring tables, edge cases, and output format.
Read **`openclaw_knowledge.md`** for platform defaults (gateway address, latest version, CLI commands).

| # | Domain | Data Sources | Key Checks | Pass/Warn/Fail | Reference |
|---|--------|-------------|------------|----------------|-----------|
| 1 | Hardware Resources | `DATA.env` | Memory, Disk, CPU, Node.js, OS | ≥80 / 60–79 / <60 | `check_hardware.md` |
| 2 | Configuration Health | `DATA.config`, `DATA.health`, `DATA.channels`, `DATA.tools`, `DATA.openclaw_json`, `DATA.status` | CLI validation, config structure, gateway, agents, channels, tools, consistency, security posture | ≥75 / 55–74 / <55 | `check_config.md` |
| 3 | Security Risks | `DATA.security`, `DATA.gateway_err_log`, `DATA.identity`, `DATA.config` | Credential exposure, file permissions, network bind, CVEs, VCS secrets | ≥85 / 65–84 / <65 | `check_security.md` |
| 4 | Skills Completeness | `DATA.skills` | Built-in tools, install capability, count & coverage, skill health, botlearn ecosystem | ≥80 / 60–79 / <60 | `check_skills.md` |
| 5 | Autonomous Intelligence | `DATA.precheck`, `DATA.heartbeat`, `DATA.cron`, `DATA.memory_stats`, `DATA.workspace_audit`, `DATA.doctor_deep`, `DATA.logs`, `DATA.status`, `DATA.workspace_identity` | Heartbeat, cron, memory, doctor, services, agents, logs, workspace identity → Autonomy Mode | ≥80 / 60–79 / <60 | `check_autonomy.md` |

**Common rules:**
- Base score = 100, subtract impacts per check failure
- If data source is null: use fallback score noted in each `check_*.md`
- Privacy: NEVER print credential values — report type + file path only
- Output: domain labels and summaries in REPORT_LANG; metrics, commands, field names in English

---

## Phase 3 — Report Generation

Generate persistent health report documents (MD + HTML) from domain analysis results.
Save to `$OPENCLAW_HOME/memory/health-reports/healthcheck-YYYY-MM-DD-HHmmss.{md,html}`.

Read **`flow_report.md`** for: output location, file naming, MD/HTML content templates, generation protocol.

---

## Phase 4 — Report Analysis

Present analysis results to the user with layered output (one-line status → domain grid → issue table → deep analysis).
Compare with historical reports for trend tracking.

Read **`flow_analysis.md`** for: output layer formats (L0–L3), historical trend comparison, follow-up prompts.
Reference **`fix_cases.md`** for real-world diagnosis patterns and root cause analysis.

---

## Phase 5 — Fix Cycle

If any issues found, guide user through fix execution with confirmation at every step.
Show fix command + rollback command → await confirmation → execute → verify.

**Never run any command that modifies system state without explicit user confirmation.**

Read **`flow_fix.md`** for: safety rules, per-fix protocol, batch mode, scope limits.
Reference **`fix_cases.md`** for proven fix steps, rollback commands, and prevention strategies.

---

## Phase 6 — Fix Summary

After fix cycle, generate a final summary: actions taken, score changes, remaining issues.
Append fix results to the previously generated report files.

Read **`flow_summary.md`** for: summary content, post-fix verification, report update, closing message.

---

## Key Constraints

1. **Scripts First** — Use `scripts/collect-*.sh` for structured data; read files directly for raw content.
2. **Evidence-Based** — Every finding must cite the specific `DATA.<key>.<field>` and its actual value.
3. **Privacy Guard** — Redact all API keys, tokens, and passwords before any output or storage.
4. **Safety Gate** — Show fix plan and await explicit confirmation before any system modification.
5. **Language Rule** — Instructions in this file are in English. All output to the user must be in REPORT_LANG.

Related Skills

Incident Postmortem Generator

3891
from openclaw/skills

Generate blameless incident postmortems from raw notes, Slack threads, or bullet points.

DevOps & Infrastructure

Post-Mortem & Incident Review Framework

3891
from openclaw/skills

Run structured post-mortems that actually prevent repeat failures. Blameless analysis, root cause identification, and action tracking.

DevOps & Infrastructure

afrexai-performance-engineering

3891
from openclaw/skills

Complete performance engineering system — profiling, optimization, load testing, capacity planning, and performance culture. Use when diagnosing slow applications, optimizing code/queries/infrastructure, load testing before launch, planning capacity, or building performance into CI/CD. Covers Node.js, Python, Go, Java, databases, APIs, and frontend.

DevOps & Infrastructure

OpenClaw Mastery — The Complete Agent Engineering & Operations System

3891
from openclaw/skills

> Built by AfrexAI — the team that runs 9+ production agents 24/7 on OpenClaw.

DevOps & Infrastructure

Legacy System Modernization Engine

3891
from openclaw/skills

Complete methodology for assessing, planning, and executing legacy system modernization — from monolith decomposition to cloud migration. Works for any tech stack, any scale.

DevOps & Infrastructure

Incident Response Playbook

3891
from openclaw/skills

Structured incident response for business and IT teams. Guides you through detection, triage, containment, resolution, and post-mortem — with auto-generated timelines and action items.

DevOps & Infrastructure

Git Engineering & Repository Strategy

3891
from openclaw/skills

You are a Git Engineering expert. You help teams design branching strategies, implement code review workflows, manage monorepos, automate releases, and maintain healthy repository practices at scale.

DevOps & Infrastructure

Django Production Engineering

3891
from openclaw/skills

Complete methodology for building, scaling, and operating production Django applications. From project structure to deployment, security to performance — every decision framework a Django team needs.

DevOps & Infrastructure

IT Disaster Recovery Plan Generator

3891
from openclaw/skills

Build production-ready disaster recovery plans that actually get followed when things break.

DevOps & Infrastructure

afrexai-api-architect

3891
from openclaw/skills

Design, build, test, document, and secure production-grade APIs. Covers the full lifecycle from schema design through deployment, monitoring, and versioning. Use when designing new APIs, reviewing existing ones, generating OpenAPI specs, building test suites, or debugging production issues.

DevOps & Infrastructure

Agent Ops Runbook

3891
from openclaw/skills

Generate a production-ready operations runbook for deploying AI agents. Covers pre-deployment checklists, shadow mode → supervised → autonomous rollout stages, monitoring dashboards, rollback procedures, cost management, and incident response templates.

DevOps & Infrastructure

node-red-manager

3891
from openclaw/skills

Manage Node-RED instances via Admin API or CLI. Automate flow deployment, install nodes, and troubleshoot issues. Use when user wants to "build automation", "connect devices", or "fix node-red".

DevOps & Infrastructure