A CLI wrapper that safely updates OpenClaw by backing up state, stopping services, running the update, and restoring on failure
Running openclaw update on a production instance destroys the running gateway, corrupts channel configs (Feishu, Telegram), and permanently deletes all cron jobs because npm install runs without stopping the LaunchAgent first. GitHub issue #66401 documented the 100% reproducible cascading failure. Multiple related issues (#62051, #42883, #37605) show this is a systemic pattern across versions. This tool wraps the update process with pre-flight checks, automatic state backup, graceful service shutdown, and rollback on failure.
Social Proof 3 sources
Gap Assessment
2 tools exist (OpenClaw built-in updater, EasyClaw) but gaps remain: Does not stop services before updating, does not backup state, does not validate after update, destroys cron jobs and channel configs; Handles initial install only, no safe update orchestration, no backup/restore, no post-update validation.
Features4 agent-ready prompts
Competitive LandscapeFREE
| Product | Does | Missing |
|---|---|---|
| OpenClaw built-in updater | Runs npm install -g openclaw@latest to update the package | Does not stop services before updating, does not backup state, does not validate after update, destroys cron jobs and channel configs |
| EasyClaw | One-click OpenClaw installer for macOS and Windows with GUI | Handles initial install only, no safe update orchestration, no backup/restore, no post-update validation |
Sign in to unlock full access.