Intermediate
macOS / Linux / Windows (WSL2) / Docker / VPS / Self-hosted
Estimated time: 20 min

OpenClaw Cost and Guardrails Checklist: Prevent Runaway Runs Before They Happen

A practical operator checklist to control blast radius and token spend: start with a bounded tool profile, tighten DM policies, make runs leave evidence, and keep a kill switch. Designed for real life, not perfect autonomy.

Implementation Steps

Most cost incidents are permission incidents. Use a bounded tools profile and strict DM policies first.

If OpenClaw ever made you think, “I just burned money and got nothing,” you are not alone.

Most cost incidents are not model-quality problems. They are operator posture problems:

  • runs that do not leave evidence (so you rerun them),
  • broad tools before you have a stable debug loop,
  • loose DM policies (so the system can be triggered too easily),
  • and no kill switch when something starts looping or flooding.

This checklist is designed to be implemented in under an hour, even if you are not a hardcore operator.


0) The one rule: start bounded, expand deliberately

Do not start from “full tools” and “open DMs” and then try to claw back safety.

Start from a bounded posture that still produces useful outcomes, then expand one dimension at a time.

If you want ready-made safe baselines, start here:


1) Tool guardrails (the fastest way to avoid runaway capability)

If your agent “only chats” or “won’t use tools”, you are likely too narrow.

If your agent can do everything, you are likely too broad.

Pick a deliberate tools profile:

  • For messaging-first workflows: keep profile: "messaging" and add only what you need.
  • For a trusted coding machine: use profile: "coding" (not full by default).

Fix guide + safe examples:


2) Channel guardrails (reduce who can trigger you)

Cost and safety are channel problems too.

Minimum defaults:

  • DMs: use pairing or allowlist (avoid open)
  • Groups: require mentions (avoid “reply to everything”)

Channel guides:

If you are using your personal WhatsApp number for testing and nothing replies, that is often a self-chat policy issue:


3) Evidence guardrails (the cheapest reliability upgrade)

When you cannot see what happened, you keep retrying, and spend becomes unpredictable.

Adopt two defaults:

  1. runs always write an artifact (file) in the workspace
  2. runs always produce a short human-readable “done” message

Start here:


4) Model-path guardrails (probe, do not infer)

If you see:

  • “no output”,
  • “all models failed”,
  • or “everything is rate limited”,

do not debug by conversation. Probe the model path directly:

openclaw models status --probe

Fix guide:

If you use relays/proxies, baseUrl + API mode mismatches are a classic cost sink:


5) Exec guardrails (do not “accidentally” enable host power)

If you want host execution, treat it as a deliberate operator choice.

Two practical rules:

  1. do not try to bypass approvals by stuffing interpreters into safeBins
  2. decide whether commands run on the gateway host or a node host, because approvals are enforced where execution happens

Start here:


6) Kill switch (one-minute incident response)

When something starts looping or flooding, do not keep tweaking config mid-incident.

Have a one-minute sequence that:

  1. stops sending (disable the channel or stop the gateway)
  2. preserves evidence (logs + state)
  3. restores from a known-good config if needed

Minimum evidence capture:

openclaw status --all
openclaw logs --limit 400 --plain

Backup/rollback discipline:

If the symptom is duplicate/flashy streaming previews (a common “flood-looking” panic):

Verification & references

  • Reviewed by:CoClaw Editorial Team
  • Last reviewed:March 14, 2026
  • Verified on: macOS · Linux · Windows (WSL2) · Docker · VPS · Self-hosted

Related Resources

OpenClaw Not Using Tools After the Update? Fix the ‘Only Chats, Doesn’t Act’ Problem
Guide
A practical step-by-step guide to fix OpenClaw when it suddenly stops using tools after recent updates. Learn how to check `tools.profile`, restore coding tools safely, and verify the agent can act again.
OpenClaw Starter Config Presets: 3 Safe Baselines You Can Actually Run
Guide
Download a conservative openclaw.json preset for local, coding, or remote dashboard access. Start with a small blast radius, then verify with a minimal probe loop before you add channels, skills, or automation.
OpenClaw Cron & Heartbeat: Make Your Agent Actually Run 24/7
Guide
A pragmatic guide to OpenClaw automation reliability: how cron runs are scheduled and delivered, why jobs can 'advance nextRunAtMs' without executing, and how to design runs that always leave evidence and alert correctly.
OpenClaw only chats and won't use tools after update
Fix
Fix OpenClaw when it suddenly stops reading files, patching code, or running commands after a recent update. The most common cause is `tools.profile: messaging` or a narrower tool policy.
OAuth token refresh failed (Anthropic Claude subscription)
Fix
Fix expired Anthropic subscription auth by switching to a Claude Code setup-token and pasting it on the gateway host.
Custom OpenAI-compatible endpoint rejects tools or tool_choice
Fix
Fix custom or proxy AI endpoints that can chat normally but fail once OpenClaw sends tools, tool_choice, parallel_tool_calls, or later tool-result turns.

Need live assistance?

Ask in the community forum or Discord support channels.

Get Support