OpenClaw Safe Update
Run production-safe OpenClaw upgrades with isolation-first defaults.
Workflow
- Use bundled script:
scripts/openclaw-safe-update.sh. - Run verify-only first (default):
bash scripts/openclaw-safe-update.sh- Optional target pin:
--target <version> - Port is auto-selected from free ports starting at
18000.
- If verify fails, inspect log path printed by script and report the root cause.
- If verify passes, ask whether to apply.
- Apply only on explicit confirmation:
bash scripts/openclaw-safe-update.sh --apply
Platform references
Detect OS first, then read exactly one platform guide:
- macOS (
uname=Darwin) →references/macos.md - Linux (
uname=Linux) →references/linux.md
Rules
- Default to verify-only; never apply without explicit user consent.
- Keep candidate install isolated (
npm --prefix ~/.openclaw/versions/<version>). - Keep sidecar isolated (
--profile sidecar-verify, dedicated--port). - Preserve logs on failure and include path in status updates.
- If verify fails, do not mutate global install.