openclaw-cost-guard

This skill should be used when the user asks to reduce OpenClaw token spend, audit model and cron cost risk, prevent denial-of-wallet incidents, add budget guardrails, review expensive agent defaults, or tighten AI-agent cost governance before wider rollout.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "openclaw-cost-guard" with this command: npx skills add x-rayluan/openclaw-agent-cost-guard

OpenClaw Cost Guard

Use this skill to identify obvious cost leaks before they turn into a denial-of-wallet problem.

Goal

Move from “the agents work” to “the agents work within an intentional budget.”

Workflow

  1. Identify the target OpenClaw config or workspace.
  2. Run the bundled cost-guard script.
  3. Review expensive defaults, missing budgets, and high-risk patterns.
  4. If the result is FAIL, stop scaling usage until cost controls are tightened.
  5. Apply the narrowest guardrails that reduce spend without breaking the workflow.

Command

node {baseDir}/scripts/cost-guard.mjs --config ~/.openclaw/openclaw.json

The --config flag is optional. If omitted, the script checks the default OpenClaw config path.

What the script checks

  • whether explicit budget signals exist
  • whether default models look expensive for always-on usage
  • whether browser/interactive tooling appears enabled without cost discipline
  • whether token limits appear excessively large
  • whether the config contains multiple high-cost patterns at once
  • whether the setup needs a governance recommendation before scaling

Output format

The script returns JSON with:

  • score
  • verdict
  • summary
  • findings
  • recommendations
  • guardrails
  • evidence

Verdicts

  • PASS — no major lightweight cost-governance gap found
  • WARN — spend risk exists and should be reviewed
  • FAIL — denial-of-wallet risk is materially elevated

Important limits

  • This is a lightweight static review, not a bill-reconciliation system.
  • A low-risk config can still become expensive through user behavior or external automations.
  • Always verify against real provider invoices and usage telemetry.

References

  • {baseDir}/references/cost-playbook.md

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

mcp-best-practices

Build production MCP servers with the TypeScript SDK. Covers spec 2025-11-25, SDK v1.29+/v2 alpha, transport selection, tool design, error handling, security...

Registry SourceRecently Updated
2600Profile unavailable
Security

solana-security

Audit Solana programs (Anchor or native Rust) for security vulnerabilities. Use when reviewing smart contract security, finding exploits, analyzing attack ve...

Registry SourceRecently Updated
1350Profile unavailable
Security

standard-readme

Write or audit README files following the Standard Readme specification (github.com/RichardLitt/standard-readme). Use this skill whenever the user asks to cr...

Registry SourceRecently Updated
1110Profile unavailable
Security

Smart Accountant with GST Understanding

Provides expert double-entry accounting support including GST compliance, audit controls, period closing, journal entries, and financial reporting.

Registry SourceRecently Updated
00Profile unavailable