Server data from the Official MCP Registry
MCP server for OpenClaw deployment health: gateway, resources, errors, skills, upgrades, disk.
MCP server for OpenClaw deployment health: gateway, resources, errors, skills, upgrades, disk.
openclaw-health-mcp is a well-structured MCP server for deployment health monitoring with appropriate security boundaries. The codebase demonstrates good input validation, safe subprocess handling with timeouts, and proper permission scoping. The linux-proc backend gracefully handles missing tools and platform differences. Minor code quality observations exist around error handling breadth, but no security vulnerabilities or malicious patterns were identified. Supply chain analysis found 4 known vulnerabilities in dependencies (0 critical, 3 high severity). Package verification found 1 issue.
5 files analyzed · 9 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-temurkhan13-openclaw-health-mcp": {
"args": [
"openclaw-health-mcp"
],
"command": "uvx"
}
}
}From the project's GitHub README.
MCP server for AI agent deployment health — gateway status, CPU/RAM/swap, recent errors from journalctl/dmesg, skill-registry integrity, upgrade outcomes, cron + disk usage in a single tool call. Each component gets a HEALTHY/DEGRADED/CRITICAL classification, with overall rollup + ranked critical findings. Linux-proc backend works on any Linux/macOS/Windows host; OpenClaw operators get native
~/.openclaw/parsing as a built-in reference implementation. Keywords: AI agent health, production AI monitoring, deployment readiness, MCP infrastructure observability.
Anyone running production AI agents needs a single tool that answers "is this deployment healthy right now?" without SSH'ing in to run six separate commands. openclaw-health-mcp exposes that visibility as MCP tools your Claude (or any MCP-aware) agent can query directly. Works on any Linux/macOS/Windows host out of the box via the linux-proc backend; OpenClaw operators get an additional native backend that parses ~/.openclaw/ paths.
> claude: is my OpenClaw deployment healthy?
[MCP tool: health_overview]
overall_health: critical
component_summary:
gateway: degraded (bound to 0.0.0.0, 1 crash in 24h)
resources: degraded (memory at 78%, swap at 12%)
skill_registry: critical (skill 'clawhub-trending-bot-v2' flagged suspicious)
upgrade: degraded (last upgrade rolled back)
cron: degraded (1 overdue job)
disk: degraded (root at 82%, log dir +187 MB/24h)
critical_findings:
[CRITICAL] Skill 'clawhub-trending-bot-v2' flagged — possible exfiltration. Disable.
[DEGRADED] Last upgrade 2026.4.23→2026.4.26 rolled back: websocket_stalls, cpu_spike.
[DEGRADED] Root disk at 82% — set up log rotation before reaching 95%.
[DEGRADED] 1 cron job(s) overdue. Install silentwatch-mcp for silent-failure detection.
openclaw-health-mcpThree things that existing tools (Datadog, Prometheus, raw top/free/df) don't do for OpenClaw specifically:
websocket_stalls, cpu_spike post-2026.4.26), distinguishes intentional restarts from crashes.cron_health here is intentionally basic and defers to silentwatch when present). Skill-registry vetting in this server is light heuristics; deep static analysis goes in openclaw-skill-vetter-mcp (planned).Built for the SMB self-hoster running OpenClaw on a $40 VPS where Datadog is overkill — but the OpenClaw-specific patterns are valuable on enterprise infra too.
The server registers these MCP tools (full spec in SPEC.md):
| Tool | Returns |
|---|---|
health_overview | Full snapshot — every component + overall HealthLevel + ranked critical findings |
gateway_status | Gateway alive/dead, uptime, restarts, crashes, bind address |
cpu_memory_health | CPU/memory/swap snapshot + 24h OOM count + load averages |
recent_errors(window_hours, min_severity) | Recent error/warning entries, filterable by lookback + severity |
skill_registry_check | Skill counts, recent additions/modifications, light heuristic flags |
last_upgrade_status | From-version, to-version, outcome, regression markers, available upgrade |
cron_health | Basic cron summary (defers to silentwatch-mcp when richer detection wanted) |
disk_usage | Root disk + log directory size + 24h growth + largest log files |
Resources:
health://overview — full snapshot (same as health_overview tool)health://gateway — gateway-onlyhealth://resources — CPU/memory-onlyPrompts:
diagnose-degraded-health — diagnostic walk-through, ranked corrective actionssummarize-health-trend — daily operational digestpip install openclaw-health-mcp
Add to ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):
{
"mcpServers": {
"openclaw-health": {
"command": "python",
"args": ["-m", "openclaw_health_mcp"],
"env": {
"OPENCLAW_HEALTH_BACKEND": "mock"
}
}
}
}
Restart Claude Desktop. Test:
Show me a full health snapshot of my OpenClaw deployment.
The mock backend returns deliberately mixed data (gateway DEGRADED, skill registry CRITICAL, etc.) so the response demonstrates the full schema.
| Backend | Status | Description |
|---|---|---|
mock | ✅ v1.0 | Sample data for protocol-wiring verification (default) |
linux-proc | ✅ v1.0 | psutil-based system metrics (CPU/memory/swap/load/disk) cross-platform; Linux-specific OOM-event detection via journalctl/dmesg; recent-error log parsing via journalctl. Returns UNKNOWN for OpenClaw-specific components (gateway, skill_registry, upgrade, cron) — those need the openclaw backend |
openclaw | ⏳ v1.1 | Parses OpenClaw config + log directory + ClawHub manifest + upgrade journal |
Select via OPENCLAW_HEALTH_BACKEND env var. Multi-backend support (federating linux-proc system metrics + openclaw application-specific) is planned for v1.2.
| Version | Scope | Status |
|---|---|---|
| v0.1 | Protocol wiring, mock backend, 8 tools / 3 resources / 2 prompts, 40 tests | ✅ |
| v1.0 | linux-proc backend (psutil + journalctl/dmesg OOM detection + log parsing); GitHub Actions CI matrix; PyPI Trusted Publishing; MCP Registry submission; 59 tests | ✅ |
| v1.1 | openclaw backend — parses OpenClaw config, log dir, ClawHub manifest, upgrade journal | ⏳ |
| v1.2 | Backend federation (linux-proc + openclaw); expanded log sources | ⏳ |
| v1.x | cowork backend, custom backend SDK, webhook emitter for alerts | ⏳ |
openclaw-health-mcp ships with a mock backend at v0.1 (Linux + OpenClaw backends in v0.2). If your AI agent runtime is different — Claude Code, Cowork, custom Python services, agent harnesses on AWS / GCP — and you want the same single-pane health visibility for it, that's a Custom MCP Build engagement.
| Tier | Scope | Investment | Timeline |
|---|---|---|---|
| Simple | Single backend adapter for an existing runtime with documented logging/metrics | $8,000–$10,000 | 1–2 weeks |
| Standard | Custom backend + custom severity rules + integration with your existing alerting | $15,000–$20,000 | 2–4 weeks |
| Complex | Multi-backend federation + RBAC + audit-log integration + on-call workflow | $25,000–$35,000 | 4–8 weeks |
To engage:
Custom MCP Build inquiryThis server is part of a production-AI infrastructure MCP suite — companion to silentwatch-mcp (cron silent-failure detection) and the upcoming AI Production Discipline Framework Notion template (the methodology these tools operationalize).
If you're running production AI and want an outside practitioner to score readiness, find the failure patterns already present, and write the corrective-action plan — that's what this MCP is built into supporting:
| Tier | Scope | Investment | Timeline |
|---|---|---|---|
| Audit Lite | One system, top-5 findings, written report | $1,500 | 1 week |
| Audit Standard | Full audit, all 14 patterns, 5 Cs findings, 90-day follow-up | $3,000 | 2–3 weeks |
| Audit + Workshop | Standard audit + 2-day team workshop + first monthly audit included | $7,500 | 3–4 weeks |
Same email channel: temur@pixelette.tech with subject AI audit inquiry.
PRs welcome. Backends are intentionally pluggable — see src/openclaw_health_mcp/backends/ for the contract.
To add a new backend:
HealthBackend in backends/<your_backend>.pybackends/__init__.pytests/test_backend_<your_backend>.pyBug reports + feature requests: open a GitHub issue.
MIT — see LICENSE.
LAUNCH50 for the first 30 days.cron_health data.Built by Temur Khan — independent practitioner on production AI systems. Contact: temur@pixelette.tech
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.