Software development work resumed with updated rules BS1 active: Docker runtime work resumed under amended packet.
BS0 passed its independent review and is approved. BS1 is currently running under an updated configuration package, Docker engine software has been installed on the BS1 test system, and the team is waiting for the reviewer to approve the updated package before proceeding with installing and testing the OpenClaw container software. BS0 was approved on independent review. BS1 is active under an amended packet. Docker engine was installed on the BS1 fixture; OpenClaw container-instance runtime work is the next step pending the amended packet's reviewer approval.
Right now the team has just finished installing the core software engine on the test system and gotten approval to move forward with the next phase of work. The previous phase, which set up a basic test environment, was reviewed and approved. Now they're ready to start building out the control system that will keep everything running smoothly and monitor the overall health of the fleet.
This build is roughly one-third of the way through its planned journey. Before this, they had to set up the initial test environment from scratch. After this phase wraps up, they'll work on letting operators add new customers and manage their security credentials, then run a controlled test of the data ingestion system, expand to support more connection types, and finally prepare everything for upgrades, backups, and disaster recovery. The next major milestone is getting approval to continue with the control system work.
- Active sequence
- Stable Control Path And Fleet Watchdog
- Latest review
- BS1 — packet amendment review
- Runtime work
- Approved to proceed
Roadmap click any sequence to expand
build-sequence-0 Fresh Provisioning Approved
Set up a new OpenClaw Instance for a test organization. Fresh-provision one OpenClaw Instance for one synthetic Org.
build-sequence-1 Stable Control Path And Fleet Watchdog Active
We're building a system to keep our control operations running reliably during disruptions and monitor the overall condition of our equipment fleet to catch problems early. Durable control path and fleet health model.
Objective
# Proposed Infrastructure Changes Replace the current SSH connection method for slice-0 with a more reliable reverse-connectivity tunnel (such as AW Gateway or Cloudflare's cloudflared tool), then add regular automated health checks to monitor all instances across the fleet. Replace or augment the slice-0 managed SSH local-forward control path with a stable AW Gateway/cloudflared or equivalent reverse-connectivity path, then strengthen recurring Instance health checks across the fleet model.
What it will deliver
- The system uses a secure reverse connection tool—like Cloudflare's cloudflared or similar software—to safely link your internal network to external services without opening direct firewall ports. AW Gateway/cloudflared or equivalent stable reverse connector.
- The system checks whether the communication pathway to the Gateway WebSocket—the intended normal route for data transmission—is accessible and working properly. Gateway WebSocket reachability through the intended steady-state path.
- The system tracks five status conditions: current (up-to-date information), stale (outdated information), unreachable (unable to connect), degraded (working but with reduced capability), and unknown (no data available). Status freshness model: current, stale, unreachable, degraded, unknown.
- The system runs regular automated checks to make sure everything is working correctly and catches any problems early. Recurring Watchdog checks.
- The system automatically identifies and categorizes different types of network disconnections so the team can quickly understand whether a connection dropped due to a client issue, server problem, or network infrastructure failure. Connection loss classification.
- We can set up automated notifications that trigger whenever a resource or system changes status, allowing your team to stay informed in real time without having to manually check for updates. Alert/event hooks for status changes.
Won't do (yet)
- The system will not accept or process data from Spawn. No Spawn ingestion.
- The test environment runs on separate infrastructure that does not contain actual customer data or connect to production systems. No real customer systems.
- I don't have enough context to rewrite this. Could you provide the technical text that needs to be revised for a mixed audience? No full Works Agent.
- The team is not currently setting up new communication or distribution methods for customers or partners. No channel onboarding.
- # No billing. The system is currently not recording or charging for usage. No billing.
- We are not currently performing any production work that spans multiple geographic regions. No production multi-region work.
build-sequence-2 Org Onboarding And Credential Collection Draft
We're setting up test accounts with fake customer information to train operators on how the system works and gather the login details they'll need for their work. Operator-driven onboarding and credential collection — no real customers.
Objective
# Operator-Driven Onboarding Workflow for New Organization Setup **Core Workflow** When a new organization joins, operators follow a guided checklist that collects required credentials (API keys, database connection strings, authentication tokens) through a secure form, then runs automated validation tests against a sandbox environment to confirm everything connects properly before the organization can access production systems. **Key Components** - **Credential Collection Form**: Operators enter each required credential one at a time with clear labels and help text; the system encrypts credentials immediately and never displays them after entry - **First-Run Validation**: Automated tests check that each credential works (by connecting to services, listing resources, or running test queries) and report pass/fail status with troubleshooting hints - **Sandbox Testing**: All validation happens in an isolated test environment that mirrors production but contains no real customer data - **Operator Checkpoints**: A final review step lets operators confirm all tests passed before marking the organization as ready for use This keeps new customers completely Turn synthetic Org setup into an operator-driven onboarding workflow for fresh provisioning, including credential collection design and first-run validation, without touching real customers.
What it will deliver
- An operator sets up a new organization account in the system to begin the setup process. Operator creates a new Org onboarding record.
- New users move through several stages as we set them up: we start with a draft profile, then wait for their credentials to arrive, verify those credentials work, check that everything meets our requirements, begin their account setup, confirm everything is working, or flag any problems that prevent moving forward. Onboarding state machine: draft, credentials pending, validation pending, ready to provision, provisioning, verified, blocked.
- The user interface for entering passwords and credentials saves only secure references (pointers to where the actual secrets are stored) rather than storing the sensitive information directly in the system. This approach keeps real passwords out of the application's database and reduces the risk of a data breach exposing them. Credential collection UX that stores only SecretRefs or fixture equivalents.
- # Credential Transition Design: Fixture to Real When we move from test credentials (fixture credentials used in development) to production credentials (real credentials used in live systems), we need a clear plan for how that handoff happens safely and securely. Fixture-to-real credential transition design.
- # Org Handoff Checklist When transferring organizational responsibilities to new team members, ensure you cover: - **Access and credentials**: Provide login information, permission levels, and system access needed to perform the role. - **Key contacts**: Share names and contact details for people they'll work with regularly across departments. - **Current projects and priorities**: Document what's in progress, deadlines, and what matters most right now. - **Tools and processes**: Explain the systems they'll use daily and the standard steps for common tasks. - **Documentation Org handoff checklist.
- # Policy/Baseline Selection The process of choosing which standard practices or rules to follow when building or managing a system—deciding, for example, whether to use stricter security settings or faster but less protected options. Policy/baseline selection.
Won't do (yet)
- The system is not processing new customer sign-ups or account creation at this time. No real customer onboarding.
- Don't use actual API keys (the security credentials that grant access to external services) in code or documents unless they've been specifically approved for a test environment that's isolated from live operations. No real provider API keys unless separately approved for a controlled non-production environment.
- The system will not accept or process data from Spawn. No Spawn ingestion.
- # Billing is Incomplete The invoice or charge statement is missing information or has not been fully processed yet. No full billing.
- There is no Works Agent available right now. No Works Agent.
- The company's different sales channels (like online, retail stores, and partners) aren't operating with the same pricing, product availability, or promotional offers. No broad channel parity.
build-sequence-3 Spawn Ingestion Dry Run Draft
We're testing our system's ability to handle incoming data using test fixtures (sample data) before processing real information. Controlled Spawn ingestion dry run with fixture systems only.
Objective
# Rewritten for Mixed Audience We can bring in a test version of the Spawn fixture (a simulated system component) to verify that our discovery tools find it, our classification system labels it correctly, our unwinding process can safely shut it down, and our audit logs capture all the details—all without affecting actual customer environments. Ingest a controlled Spawn-like fixture and prove discovery, classification, unwind planning, and evidence generation without touching real customer systems.
What it will deliver
- The team maintains a managed supply of spawn-like test fixtures (specialized equipment used to simulate real-world conditions in testing) to ensure consistent availability for quality assurance activities. Controlled Spawn-like fixture inventory.
- # Existing OpenClaw Discovery The OpenClaw security flaw has been found in systems that use this software library. Existing OpenClaw discovery.
- This system tracks all active components—including agents (automated workers), binding connections (communication links), sessions (active conversations), channels (communication routes), plugins (add-on tools), and tasks (work items)—to show what's running and how resources are being used. Agent/binding/session/channel/plugin/task inventory.
- # Tenant/Org Classification Workflow The system sorts customers and their organizations into categories based on size, industry, or contract type so that each one receives appropriate support and service levels. This classification happens automatically when a new customer signs up and can be updated manually if business needs change. Tenant/Org classification workflow.
- # Observe → Managed → Authoritative State Model The system moves through three stages: first it watches what's currently happening, then it takes action to match a desired configuration, and finally it enforces that configuration as the source of truth that overrides any manual changes. Observe -> Managed -> Authoritative state model.
- # Unwind Plan with No Destructive Execution We can reverse or stop the system changes we made while keeping all data and configurations intact, so nothing gets lost or damaged in the process. Unwind plan with no destructive execution.
Won't do (yet)
- # Spawn systems are test environments only and don't contain actual customer data. No real customer Spawn systems.
- The system will preserve all existing data and settings during the transfer to the new platform, so nothing will be lost or overwritten. No destructive migration.
- The system will not switch over to a backup automatically if the primary system fails. No automatic cutover.
- Team members must use separate, unique login credentials for each application and cannot reuse passwords across systems—except within approved test environments and secure credential storage systems that IT has authorized. No credential reuse outside approved fixture/vault paths.
- The system does not trust information from previous versions or earlier data states and instead verifies everything from scratch each time. No assumption that legacy state is trustworthy.
- The system doesn't balance workload across different channels beyond grouping them by fixture type. No channel parity beyond fixture classification.
build-sequence-4 Channel Onboarding Parity Draft
# Controlled Channel Onboarding Workflows New sales or distribution channels go through a structured approval process with defined checkpoints before they can start operating. Each step requires specific teams to review and sign off on requirements like pricing, inventory, and compliance before the channel can launch. Controlled channel onboarding workflows.
Objective
Teams can now set up communication channels with built-in approval processes and security controls, ensuring that designated priority channels stay protected while keeping organization-owned login credentials secure and maintaining a complete record of who accessed what information—with the ability to hide sensitive data when needed. Add controlled channel setup workflows for prioritized channels while preserving Org-owned credentials, auditability, and redaction.
What it will deliver
- We're setting up a step-by-step process to bring new sales channels online, with each channel following its own customized setup path based on its specific requirements. Prioritized channel onboarding flows, likely split by channel.
- Each communication channel (like email, messaging, or API connections) has its own separate set of login credentials and access tokens that must be managed and refreshed individually. Fixture credential/token handling per channel.
- When setting up tests or integrations, you need to register a web address where the system will automatically send notifications or data when specific events happen. This is similar to providing a mailing address so the system knows where to deliver messages. Webhook endpoint registration or fixture equivalent.
- The system sends regular test messages to communication channels to verify they're working properly and alert the team if any channels fail to respond. Channel status probes.
- The system records and tracks specific actions taken within each communication channel (such as email, chat, or phone) so teams can review who did what and when for compliance and security purposes. Channel-specific audit events.
- The organization applies different data-hiding standards depending on which communication channel is used—for example, email might require names and addresses to be removed, while a public website might need additional redaction of account numbers and payment information. Channel-specific redaction rules.
Won't do (yet)
- Don't use the same content across all sales channels (online, retail, phone, etc.) in a single release unless you've specifically divided the content by channel and gotten approval first. No all-channel parity in one slice unless explicitly split and approved.
- The system currently has no actual customer communication channels active in the production environment. No real production customer channels.
- The system does not store passwords or authentication tokens that work across all channels—each channel uses its own separate login credentials. No platform-wide channel credentials.
- All channel automation must work end-to-end without requiring people to manually step in and complete tasks that should happen automatically. No unsupported channel automation hidden behind manual steps.
- I don't have enough context to rewrite this. Could you provide the technical text you'd like me to simplify for a mixed audience? No Works Agent behavior expansion.
build-sequence-5 Operations, Upgrades, And DR Hooks Draft
# Key Operational Tasks for System Changes **Upgrade** means installing a newer version of software to gain new features or security fixes. **Rollback** means reverting to a previous version if problems occur. **Backup** means copying critical data to a separate location so it can be restored if something goes wrong. **Disaster Recovery (DR)** refers to the procedures and systems in place to restore operations after a major failure. **Operations readiness** means confirming that staff, processes, and systems are prepared to handle the change smoothly. Upgrade, rollback, backup, DR, and operations readiness.
Objective
**Operational Readiness Framework for AW** Establish clear ownership by defining who handles routine tasks, upgrades, and emergencies; create a documented upgrade process that tests changes before deploying them to production along with a plan to quickly reverse problematic updates; implement automatic backup procedures and tested recovery methods to restore data if needed; and prepare step-by-step disaster recovery guides that teams can follow during outages, while capturing incident details for later review. Formalize AW operational readiness: roles, upgrade policy, rollback, backup/restore hooks, disaster recovery runbooks, and incident evidence.
What it will deliver
- # MSP Role Matrix A role matrix for a Managed Service Provider (MSP) documents who performs what tasks, when they're responsible, and who approves decisions—helping teams stay aligned on responsibilities across different service areas. MSP role matrix.
- We're updating the canary flow—the process that gradually rolls out changes to a small group of users first before expanding to everyone—to improve how we test and monitor new features. Upgrade canary flow.
- The system verifies whether OpenClaw (a software tool) can work properly with your current setup and configuration. This check confirms that all necessary components are in place before you proceed with using the tool. OpenClaw compatibility check.
- # Rollback Policy and Dry-Run When deploying changes, a dry-run simulates the deployment without making actual changes, so your team can verify everything works correctly before going live. If problems occur after a real deployment, the rollback policy defines the steps to revert to the previous stable version quickly. Rollback policy and dry-run.
- The system saves a complete record of all backup storage locations and the instructions that trigger automatic restore actions, allowing teams to recover data quickly if needed. Backup inventory and restore hook definitions.
- # Disaster Recovery Runbook: Control-Plane and Instance-Host Failures ## Control-Plane Failure When the system's central management layer stops responding, immediately contact the infrastructure team to check hardware status, restart the affected servers, and redirect traffic to backup management systems while repairs are underway. ## Instance-Host Failure If individual application servers go down, the system automatically moves running applications to healthy servers; your team should verify that services are responding normally and alert the infrastructure team if any applications fail to restart within 5 minutes. DR runbook for control-plane failure and Instance-host failure.
Won't do (yet)
- Don't move forward with releasing this to all customers unless leadership gives explicit approval first. No full production launch unless separately approved.
- The team has not yet conducted a live test of the backup and recovery plan with actual customers involved. No real customer DR exercise.
- Work on a single region for now unless we explicitly plan a separate project for multi-region support. No multi-region implementation unless separately scoped.
- I'd be happy to help rewrite technical text for a mixed audience, but I don't see any text to rewrite in your message. Could you please share the technical content you'd like me to simplify? No billing or marketing.
- The system does not automatically update itself when running on actual production servers. No automatic upgrade across a real fleet.
Stable Control Path And Fleet Watchdog — checkpoints 10 recorded
Current gate
- Packet amendment review
- Pass BS1 packet amendment approved; ready for renewed user approval before Docker runtime proof
- Amended packet committed
- Pass
- Docker / containerized runtime proof
- In progress Docker engine installed (runs/codex-bs1/architecture-rebuild-evidence/build-sequence-1/codex-bs1/checkpoints/checkpoint-009-docker-engine-install.md); runtime container work not yet started.
Architecture warning
Evidence hygiene
- Redaction status
- applied
- No real customer data
- Pass
- No real provider credentials
- Pass
- No raw secret material exposed
- Pass