Run a safe OpenClaw restore drill with ReClaw.
Verify recovery before an outage by downloading, decrypting, and checking a ReClaw archive into a temporary path.
Goal
A restore drill proves that your latest ReClaw backup can be downloaded, decrypted, and verified without touching the live OpenClaw installation. Run it after first setup, before major upgrades, and after moving to a new host.
Prepare
Use a fresh output directory. ReClaw restore commands intentionally refuse to overwrite existing files.
mkdir -p "$HOME/reclaw-restore-drill"
reclaw backup account-status
reclaw backup list --jsonChoose Backup
Pick a backup with READY status and inspect the metadata if the passphrase is available locally.
reclaw backup show <backup-id>
reclaw backup show <backup-id> --decrypt-metadataRestore Safely
Restore into the drill directory and ask ReClaw to verify the archive after decryption.
reclaw backup restore <backup-id> \
--verify \
--output "$HOME/reclaw-restore-drill/openclaw-backup.tar.gz"Record Result
Record enough detail for the next operator or agent to know whether recovery is real.
Restore drill:
- Date:
- Backup id:
- Archive path:
- Verification:
- OpenClaw version:
- Notes:Do Not
- Do not print ReClaw API tokens or backup passphrases.
- Do not send backup passphrases to the ReClaw server.
- Do not overwrite a previous restore-drill archive.
- Do not invent an OpenClaw import command during recovery.
Next
After a successful drill, keep automatic backups enabled and follow the update checklist before high-risk OpenClaw changes.