Liquefy-openclaw-integration liquefy-openclaw
Use this skill when working with Liquefy around OpenClaw, including workspace scan/pack flows, policy explanation, search/restore, guarded runs, context gate, replay blocking, native hook integration, session vaulting, and state/history guard workflows.
install
source · Clone the upstream repo
git clone https://github.com/Parad0x-Labs/liquefy-openclaw-integration
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/Parad0x-Labs/liquefy-openclaw-integration "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/liquefy-openclaw" ~/.claude/skills/parad0x-labs-liquefy-openclaw-integration-liquefy-openclaw-c692ca && rm -rf "$T"
OpenClaw · Install into ~/.openclaw/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/Parad0x-Labs/liquefy-openclaw-integration "$T" && mkdir -p ~/.openclaw/skills && cp -r "$T/skills/liquefy-openclaw" ~/.openclaw/skills/parad0x-labs-liquefy-openclaw-integration-liquefy-openclaw-c692ca && rm -rf "$T"
manifest:
skills/liquefy-openclaw/SKILL.mdsource content
Liquefy OpenClaw
Use this skill when the user wants to:
- scan or pack an OpenClaw workspace with Liquefy
- understand why Liquefy denied a path
- search or restore from an existing Liquefy vault
- run OpenClaw with rollback, context budgeting, replay blocking, or restore-on-failure
- install or inspect native Liquefy integration inside OpenClaw
- vault OpenClaw session/state directories
- protect OpenClaw state or pulled history before risky actions
Start Here
Default to the local Liquefy CLI:
liquefy openclaw --jsonliquefy openclaw run --jsonliquefy searchliquefy restoreliquefy safe-run --jsonliquefy context-gate compile --jsonliquefy context-gate history --jsonpython tools/openclaw_tracevault.pypython tools/liquefy_openclaw_plugin.py hook install|uninstall|statusliquefy state-guard ...liquefy history-guard ...
Optional packaged plugin path:
- if the user already has the OpenClaw plugin installed,
andliquefy_scan
are availableliquefy_pack_apply - do not assume those plugin tools exist in a standalone skill install
Preflight
Before using repo-relative tools or plugin commands:
- verify
is installed and callableliquefy - verify repo-relative
paths exist before usingtools/python tools/... - verify optional plugin tools exist before using them
- verify
is set before any secure pack/apply flowLIQUEFY_SECRET - prefer
for commands that support it when machine-readable results matter--json
If a required command, repo path, or dependency is missing:
- stop and explain the missing dependency
- do not guess alternate commands
- do not pretend plugin or repo-only surfaces are available
Compatibility note:
- this standalone skill is aligned to the Liquefy OpenClaw command surface currently shipped in this repo
- check
andliquefy version --json
before relying on newer flagsliquefy openclaw --version --json - if the optional OpenClaw plugin is used, it expects Liquefy OpenClaw CLI
>= 1.1.0
Hard Rules
- Prefer read-only scan before any write/apply action.
- Do not ask for
or risky allow-category overrides unless the user explicitly wants denied paths included.--include-secrets - If the user asks for protection on the next OpenClaw run, do not use raw
; preferopenclaw run
orliquefy openclaw run
.liquefy safe-run - If
reportscontext-gate
, stop and explainblocked=true
instead of trying to route around it.block_reason - If secure pack/apply is requested, ensure
exists before enablingLIQUEFY_SECRET
.--secure - Do not pretend the standalone skill install also installed the plugin package. Treat plugin tools as optional.
- Do not run pack, apply, restore, hook install/uninstall, or other write-affecting operations unless the user explicitly requested that action after review.
References
- For workflow selection and commands, read references/workflows.md.
- For install/update truth, standalone vs plugin split, and trust posture, read references/integration.md.
- For JSON contracts and stable machine-readable fields, read references/contracts.md.
Load only the reference file needed for the current request.
Quick Routing
- Workspace audit or pack:
use
by default; only use plugin tools if the user already has the plugin enabled.liquefy openclaw - Policy denial or override question:
use
and report the matched category/reason.liquefy openclaw --explain ... - Next run must be protected:
use
orliquefy openclaw run
, not raw OpenClaw.liquefy safe-run - User wants automatic OpenClaw archival:
use native hook install/status/uninstall via
.liquefy_openclaw_plugin.py - User wants specific agent session vaulting:
use
.openclaw_tracevault.py - User needs restore/search on an existing vault:
use
/liquefy search
.liquefy restore - User wants filesystem/state protection outside packing:
use
orstate-guard
.history-guard
Example Intents
- "Scan my OpenClaw workspace and tell me what Liquefy would pack."
- "Why did Liquefy deny
?"credentials/api.pem - "Run OpenClaw with replay blocking and rollback."
- "Show the context gate history for this workspace."
- "Pack this workspace with ratio profile after review."
- "Install Liquefy hooks into OpenClaw and show status."
- "Restore this OpenClaw vault and search it for a trace id."
- "Protect
before the next run."wallet-state.json