clawdbot-release-check

Check for new clawdbot releases and notify once per new version.

533 stars

Best use case

clawdbot-release-check is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Check for new clawdbot releases and notify once per new version.

Teams using clawdbot-release-check should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/clawdbot-release-check/SKILL.md --create-dirs "https://raw.githubusercontent.com/sundial-org/awesome-openclaw-skills/main/skills/clawdbot-release-check/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/clawdbot-release-check/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How clawdbot-release-check Compares

Feature / Agentclawdbot-release-checkStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Check for new clawdbot releases and notify once per new version.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# Clawdbot Release Check

Checks for new clawdbot releases from GitHub and notifies you once per version. No nagging.

## Installation

```bash
clawdhub install clawdbot-release-check
```

## Quick Setup (with cron)

```bash
# Add daily update check at 9am, notify via Telegram
{baseDir}/scripts/setup.sh --telegram YOUR_TELEGRAM_ID

# Custom hour (e.g., 8am)
{baseDir}/scripts/setup.sh --hour 8 --telegram YOUR_TELEGRAM_ID

# Remove cron job
{baseDir}/scripts/setup.sh --uninstall
```

After setup, restart the gateway:
```bash
launchctl kickstart -k gui/$(id -u)/com.clawdis.gateway
```

## Manual Usage

```bash
# Check for updates (silent if up-to-date or already notified)
{baseDir}/scripts/check.sh

# Show version info
{baseDir}/scripts/check.sh --status

# Force notification (bypass "already notified" state)
{baseDir}/scripts/check.sh --force

# Show highlights from ALL missed releases
{baseDir}/scripts/check.sh --all-highlights

# Clear state (will notify again on next check)
{baseDir}/scripts/check.sh --reset

# Help
{baseDir}/scripts/check.sh --help
```

## How It Works

1. Fetches latest release from `github.com/clawdbot/clawdbot/releases`
2. Compares with your installed version (from `package.json`)
3. If behind, shows highlights from release notes
4. Saves state to prevent repeat notifications

## Example Output

```
🔄 **Clawdbot Update Available!**

Current: `2.0.0-beta5`
Latest:  `2026.1.5-3`

_(3 versions behind)_

**Highlights:**
- Models: add image-specific model config
- Agent tools: new `image` tool
- Config: default model shorthands

🔗 https://github.com/clawdbot/clawdbot/releases/tag/v2026.1.5-3

To update: `cd /path/to/clawdis && git pull && pnpm install && pnpm build`
```

## Files

**State** — `~/.clawdbot/clawdbot-release-check-state.json`:
```json
{
  "lastNotifiedVersion": "v2026.1.5-3",
  "lastCheckMs": 1704567890123
}
```

**Cache** — `~/.clawdbot/clawdbot-release-check-cache.json`:
- Release data cached for 24 hours (saves API calls)
- Highlights extracted once per release (saves tokens)
- Use `--clear-cache` to force refresh

## Configuration

Environment variables:
- `CLAWDBOT_DIR` — Path to clawdbot source (auto-detected from `~/dev/clawdis`, `~/clawdbot`, or npm global)
- `CACHE_MAX_AGE_HOURS` — Cache TTL in hours (default: 24)

Related Skills

clawdbot-workspace-template-review

533
from sundial-org/awesome-openclaw-skills

Compare a Clawdbot workspace against the official templates installed with Clawdbot (npm or source) and list missing sections to pull in, especially after upgrades.

clawdbot-skill-update

533
from sundial-org/awesome-openclaw-skills

Comprehensive backup, update, and restore workflow with dynamic workspace detection

clawdbot-self-security-audit

533
from sundial-org/awesome-openclaw-skills

Perform a comprehensive read-only security audit of Clawdbot's own configuration. This is a knowledge-based skill that teaches Clawdbot to identify hardening opportunities across the system. Use when user asks to "run security check", "audit clawdbot", "check security hardening", or "what vulnerabilities does my Clawdbot have". This skill uses Clawdbot's internal capabilities and file system access to inspect configuration, detect misconfigurations, and recommend remediations. It is designed to be extensible - new checks can be added by updating this skill's knowledge.

clawdbot-security

533
from sundial-org/awesome-openclaw-skills

Security audit and hardening for Clawdbot/Moltbot installations. Detects exposed gateways, fixes permissions, enables authentication, and guides firewall/Tailscale setup.

clawdbot-logs

533
from sundial-org/awesome-openclaw-skills

Analyze Clawdbot logs and diagnostics. Use when the user asks about bot performance, response times, errors, session stats, token usage, API costs, or wants to debug slow responses.

clawdbot-documentation-expert

533
from sundial-org/awesome-openclaw-skills

No description provided.

clawdbot-cost-tracker

533
from sundial-org/awesome-openclaw-skills

Track Clawdbot AI model usage and estimate costs. Use when reporting daily/weekly costs, analyzing token usage across sessions, or monitoring AI spending. Supports Claude (opus/sonnet), GPT, and Codex models.

clawdbot-backup

533
from sundial-org/awesome-openclaw-skills

Backup and restore ClawdBot configuration, skills, commands, and settings. Sync across devices, version control with git, automate backups, and migrate to new machines.

auth-checker

533
from sundial-org/awesome-openclaw-skills

Audit authentication flows for security vulnerabilities

a11y-checker

533
from sundial-org/awesome-openclaw-skills

Scan HTML and JSX for accessibility issues with AI-powered fix suggestions

portfolio-watcher

533
from sundial-org/awesome-openclaw-skills

Monitor stock/crypto holdings, get price alerts, track portfolio performance

portainer

533
from sundial-org/awesome-openclaw-skills

Control Docker containers and stacks via Portainer API. List containers, start/stop/restart, view logs, and redeploy stacks from git.