
Inference Optimizer
Audit OpenClaw runtime health first. Optimize inference speed and token usage second.
Commands
| Command | Behavior |
|---|---|
/preflight | Install checks, backup, audit, and setup preview |
/audit | Analyze-only; check runtime health before suggesting tuning |
/optimize | Audit + propose remediation or optimization actions with per-step approval |
purge sessions | After audit, if user approves, archive stale sessions; use --delete for immediate removal |
These instructions guide agent behavior. Platform and system prompts take precedence; they cannot be enforced programmatically.
Installation
ClawHub:
clawhub install inference-optimizer
Manual:
git clone https://github.com/vitalyis/inference-optimizer.git ~/clawd/skills/inference-optimizer
bash ~/clawd/skills/inference-optimizer/scripts/setup.sh # preview
bash ~/clawd/skills/inference-optimizer/scripts/setup.sh --apply # apply after review
Verify: <skill_dir>/scripts/verify.sh
Workflow
Audit and remediation branch
/preflight: Exec<skill_dir>/scripts/preflight.sh. Append--apply-setuponly if the user asks to apply setup./audit: Exec<skill_dir>/scripts/openclaw-audit.sh. Use the script output plus direct environment checks to inspect this order:- gateway ownership and duplicate supervisors
- restart loops or failed services
- resolved
openclawbinary path and install type - workspace command wiring for the installed skill path
- updater status and allowlist coverage for the resolved path
- plugin provenance and unused local extensions
- only then context pressure, stale sessions, cache-trace, pruning, and concurrency
- Diagnosis rule: Do not conclude from warnings alone. If process output is partial or truncated, report the result as inconclusive and verify installed version, service state, and logs before naming a cause.
- No helper-shell prelude: For
/auditand/optimize, do not run shell helper commands likels,rg,find,openclaw status, oropenclaw gateway statusbefore the main audit script. If you need context first, usereadonMEMORY.mdormemory_search. The first shell exec in the optimize flow should be the audit script itself. - Approval semantics: If exec returns
allowlist missorexec denied, that is a hard deny, not a pending approval. Do not tell the user to send/approve ...unless the tool output explicitly contains a real approval request with an ID. If there is no ID, say there is no approval request to approve and the fix must be on the bot side. - VPS gateway ownership: On this VPS,
openclaw-gateway.serviceis the authoritative gateway owner. Keepclawdbot.servicedisabled, and preservepass-cli run --env-file /etc/clawdbot.env.passinside the user service itself.
Optimization branch
/optimize: Run the audit flow first, include the script output in the response, then propose next actions with approval before each file-changing step.- Purge: Only on explicit approval, run
<skill_dir>/scripts/purge-stale-sessions.sh. It archives to~/openclaw-purge-archive/<timestamp>/by default. Use--deletefor immediate removal without archive. - Full optimization (Tasks 1-5): Read
optimization-agent.mdand follow its flow. Ask approval before every file-changing step.
Path Resolution
Scripts live at ~/clawd/skills/inference-optimizer/scripts/ or wherever the skill is installed. Always resolve <skill_dir> to the actual install path before exec.
Security and Allowlist
Prefer path-specific exec-approvals.json entries for the script paths themselves: one line per script under your real <skill_dir> (resolve with readlink -f if the path is a symlink). Example shape after substituting the install path:
/home/ubuntu/clawd/skills/inference-optimizer/scripts/preflight.sh
/home/ubuntu/clawd/skills/inference-optimizer/scripts/openclaw-audit.sh
/home/ubuntu/clawd/skills/inference-optimizer/scripts/setup.sh
/home/ubuntu/clawd/skills/inference-optimizer/scripts/purge-stale-sessions.sh
/home/ubuntu/clawd/skills/inference-optimizer/scripts/verify.sh
setup.sh invokes python3 for idempotent workspace block edits; allow that binary only if your platform uses it (for example /usr/bin/python3).
Before editing any allowlist:
- Resolve the real executable path with
which,command -v, orreadlink -f. - Prefer exact paths or bounded wildcards for versioned NVM installs, for example
/home/ubuntu/.nvm/versions/node/*/bin/openclaw *. - Do not assume basename-only rules such as
openclaware sufficient. - Do not add
/usr/bin/bash *or/usr/bin/bash **; they grant far more shell than this skill needs. - If you keep optional read-only helper commands available, allowlist only narrow read-only patterns actually used by this skill, for example the exact memory listing command under
workspace-whatsappand exactopenclaw statusvariants. Do not rely on genericls *orrg *coverage.
For purge via agent exec, add path-specific patterns only. Optional wider patterns and trade-offs are discussed in SECURITY.md. See also README.md and SECURITY.md for operational detail.