xerg

Audit OpenClaw and Hermes workflows in dollars. Local-first audits with init, compare mode, OpenClaw remote support, CI gates, and optional hosted follow-up.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "xerg" with this command: npx skills add jasonacurry/xerg

Xerg

Use xerg if it is already installed. If not, use npx @xerg/cli with the same arguments.

Xerg audits OpenClaw and Hermes workflows in dollars, not tokens. It reads gateway logs and session transcripts, surfaces confirmed waste plus savings opportunities, and helps you measure fixes with --compare.

Local audits need no account. Hosted sync and hosted MCP are optional paid workspace features. No data leaves your machine unless you explicitly push results to Xerg Cloud.

Quick Start

xerg init
xerg audit --compare

Use direct commands when you need explicit control, non-interactive behavior, JSON output, or CI gates:

xerg doctor
xerg audit
xerg audit --json
xerg audit --fail-above-waste-rate 0.30

Inputs

Xerg needs one of these source inputs:

  • Local OpenClaw data at the default paths:
    • /tmp/openclaw/openclaw-*.log
    • ~/.openclaw/agents/*/sessions/*.jsonl
  • Local Hermes data at the default paths:
    • ~/.hermes/logs/agent.log* with gateway.log* fallback
    • ~/.hermes/sessions/
  • Explicit paths via --log-file and/or --sessions-dir
  • An SSH target via --remote
  • A Railway target via --railway
  • A multi-source config via --remote-config

Additional requirements:

  • --compare needs at least one previously stored compatible local snapshot
  • Pushing needs auth via XERG_API_KEY, ~/.xerg/config.json, or browser credentials from xerg login
  • SSH audits require ssh and rsync on your local PATH and are OpenClaw-only in this phase
  • Railway audits require the railway CLI on your local PATH and are OpenClaw-only in this phase

Default Flow

  1. Start with the default first-run path when you want the fastest local result:
xerg init
  • init detects local OpenClaw or Hermes data
  • it runs a first audit with local snapshot persistence enabled
  • it offers optional hosted follow-up after the audit completes
  • if no local data is found, it prints explicit local-path commands plus remote OpenClaw-only guidance
  1. Detect sources directly when paths or connectivity are uncertain:
xerg doctor
xerg doctor --verbose
xerg doctor --remote user@host
xerg doctor --railway
  • xerg doctor --verbose shows progress on stderr while Xerg checks local paths or remote transports
  • If local defaults are empty, prefer xerg doctor --remote ... or xerg doctor --railway instead of guessing paths
  1. Run a baseline audit explicitly when you want direct control:
xerg audit
xerg audit --runtime openclaw
xerg audit --runtime hermes
  1. Choose the right output mode for the task:
xerg audit
xerg audit --json
xerg audit --markdown
  • Plain xerg audit is best for a human-readable summary
  • xerg audit --json is best for automation and agents
  • xerg audit --markdown is best for a shareable report
  1. After a workflow or model change, measure the delta:
xerg audit --compare
xerg audit --compare --json
  1. Export, push, or hosted-setup only when needed:
xerg audit --markdown > xerg-audit.md
xerg connect
xerg mcp-setup
xerg audit --push
xerg push
  • connect is the guided hosted path: it reuses existing auth, prompts before browser login when needed, and offers to push the latest audit
  • mcp-setup prints or writes hosted MCP config for Cursor, Claude Code, or another client
  • local audits and compare remain available if you skip hosted setup

Source Selection

Local defaults:

xerg audit

If both OpenClaw and Hermes are present locally, pass --runtime openclaw or --runtime hermes explicitly.

Explicit local paths:

xerg audit --runtime openclaw --log-file /path/to/openclaw.log
xerg audit --runtime openclaw --sessions-dir /path/to/sessions
xerg audit --runtime hermes --log-file ~/.hermes/logs/agent.log
xerg audit --runtime hermes --sessions-dir ~/.hermes/sessions

SSH remote:

xerg audit --remote user@vps.example.com
xerg audit --remote user@vps.example.com \
  --remote-log-file /opt/openclaw/logs/openclaw.log \
  --remote-sessions-dir /opt/openclaw/sessions

Railway:

xerg audit --railway
xerg audit --railway --project <id> --environment <id> --service <id>

Multiple remote sources:

xerg audit --remote-config ~/.xerg/remotes.json

Remote config files use this shape:

{
  "remotes": [
    {
      "name": "prod",
      "transport": "ssh",
      "host": "deploy@prod.example.com"
    },
    {
      "name": "railway-prod",
      "transport": "railway",
      "railway": {
        "projectId": "...",
        "environmentId": "...",
        "serviceId": "..."
      }
    }
  ]
}

CI And Automation

For CI gates, prefer a single command so the audit can still be pushed before threshold failure:

xerg audit --push --fail-above-waste-rate 0.25 --fail-above-waste-usd 100

Common variants:

xerg audit --fail-above-waste-rate 0.30
xerg audit --fail-above-waste-usd 50
xerg audit --since 24h --fail-above-waste-rate 0.30

Documented exit codes:

  • 0 success
  • 1 runtime error
  • 2 no supported local runtime data found
  • 3 threshold exceeded

Automation can branch on those codes instead of scraping terminal output.

Recommendations

When using --json, expect a recommendations array alongside the audit summary. Each recommendation item includes:

  • id, findingId, kind, title, summary
  • priorityBucket, recommendedOrder, implementationSurface, category
  • severity, confidence, effort
  • estimatedSavingsUsd, estimatedSavingsPct
  • scope, scopeId, scopeLabel
  • whereToChange, validationPlan, actions

Current recommendation kinds map into the Action queue buckets:

  • fix_now: retry-waste, loop-waste
  • test_next: context-outlier, idle-spend, candidate-downgrade, cache-carryover, max-mode-concentration
  • watch: unknown or uncategorized findings

Prefer high-confidence or reversible fixes first. Treat model downgrades, context changes, and Cursor behavior changes as compare-friendly experiments, not guaranteed savings.

Checks

Before finalizing work that used Xerg:

  • Say whether the audit was local, SSH, Railway, or multi-source
  • Say whether the output was plain terminal text, JSON, or Markdown
  • If --compare was used, confirm that it compared against a compatible stored snapshot
  • If no data was found, run xerg doctor or use explicit source flags rather than guessing
  • Say whether results were pushed to the Xerg API
  • Distinguish confirmed waste (retry-waste, loop-waste) from directional opportunities (context-outlier, idle-spend, candidate-downgrade)

Notes

  • --compare and --no-db cannot be used together
  • Xerg is local-first: it stores economic metadata and audit snapshots locally, not prompt or response content
  • XERG_API_KEY is recommended for CI and non-interactive automation
  • If browser auth is needed without the hosted setup flow, use xerg login; remove stored credentials with xerg logout
  • Pilot: xerg.ai/pilot
  • Support: query@xerg.ai

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Jobaudit

Audit your OpenClaw cron job history and estimate how much you've spent on AI agents this week.

Registry SourceRecently Updated
930Profile unavailable
Security

Skill Quality Check

Quality audit for AI Agent Skills. Use before installing or after writing any SKILL.md. Scores 5 dimensions with actionable improvements. Works for skills wr...

Registry SourceRecently Updated
1351Profile unavailable
Security

Self Audit

Track, analyze, and score your tool calls to identify unnecessary usage, detect patterns, and get recommendations for efficiency improvements.

Registry SourceRecently Updated
2090Profile unavailable
Security

Deepsafe Scan

Preflight security scanner for AI coding agents — scans deployment config, skills/MCP servers, memory/sessions, and AI agent config files (hooks injection) f...

Registry SourceRecently Updated
3150Profile unavailable