OpenClaw is the operator-facing wrapper around Project Phoenix: the shell that makes deterministic backends accessible without becoming the authority.
Working rule: OpenClaw makes Project Phoenix accessible. Project Phoenix makes OpenClaw outputs trustworthy.
Project Phoenix already had deterministic authority: grounded domain tools, solver-backed computation, and benchmark-backed evaluation. What it lacked was an operator-facing wrapper that exposed those capabilities without forcing the operator to know the internal repo structure.
OpenClaw fills that gap as an outer layer for access, compression, monitoring, and workflow discipline. The wrapper is useful only if the authority boundary holds. The shell can expose, summarize, and verify. It cannot become the place where correctness is decided.
HTTP surfaces, operator packets, hardening gate, and incident workflow.
Routing and domain compression layer. Exposes Phoenix findings in operator-readable form.
Deterministic domains and solvers. Correctness, grounding, and benchmark truth stay here.
Expose deterministic backends through stable endpoints and scripts instead of tribal knowledge.
Turn raw JSON, traces, and CSV artifacts into operator-readable packets and decision surfaces.
Enforce incident handling, hardening checks, and documentation review so workflow decay is visible.
| Surface | Role | Current use |
|---|---|---|
/phoenix-ops-summary |
Authority snapshot | Compressed system state across Phoenix backends. |
/phoenix-ops-status |
Backend health | Per-backend health, aggregate checks, and recent invocation log. |
/phoenix-ops-workspace |
Operator workspace | Starting surface for status, routing, screenshot, and incident context. |
/phoenix-ops-trends |
Trend reporting | Compact rolling view of latency, health counts, and summary history. |
/phoenix-benchmark-summary |
Benchmark packet | Deterministic benchmark exposure through the wrapper. |
scripts/check_openclaw_hardening.sh is the single verification command for endpoint health, threshold compliance, and artifact state.
Modes: default live check, --record for milestone audit runs, --skip-live for artifact-only validation.
openclaw_repair_packet.sh through openclaw_validate_incidents.sh tracks operator-visible failures from capture to resolution.
Resolution behavior is now governed by a validated PBC behavioral contract (scripts/pbc/openclaw-resolution.pbc.md), schema-conformant and regression-testable. The contract has documentation authority; enforcement gate is the next step.
Paper 1.17 selected use cases under one rule: do not add features in search of use cases; add use cases that prove the wrapper is useful.
openclaw_benchmark_review.sh
Compresses benchmark artifacts into an operator packet. Makes harness importance and protocol-tier results visible without manual JSON inspection.
openclaw_run_trace_triage.sh
Maps recurring failure families to replay targets and escalation verdicts. Separates live design gaps from legacy capture noise.
openclaw_model_comparison_packet.sh
Packages local model comparisons with transport-validity metadata. Encodes the Paper 1.16 capture-integrity correction.
openclaw_repair_packet.sh
Tracks real breakages through before-state capture, fix, after-state evidence, and validation. One stale run-trace script was fixed end-to-end through this loop.
openclaw_doc_status_review.sh
Runs deterministic drift checks across operator documents. Found and cleared stale claims, an outdated current-state note, and missing script references.
openclaw_routing_policy.sh
Encodes a four-lane routing policy backed by benchmark evidence: deterministic, local repair-assisted, local strict protocol, and strong-model API.
openclaw_showcase_routing_demo.sh
Confirms the same pattern seen in TSP: rule routing stays authoritative, while forced LLM routing introduces the failures.
OpenClaw never became the authority layer. The shell stayed outside. The authority stayed inside. Correctness stayed in the deterministic layer.
Sandboxed localhost checks do not always see the live gateway. Some endpoint verification still needs the live shell environment.
Stan regularization and ParableAgent teaching-complexity gaps remain tracked as incidents and still need routing-surface fixes.
Pipeline and handoff trace lanes still need post-fix reruns under clean ollama_api capture.
The solver-backed demo pattern is confirmed in TSP and ShowcaseAgent routing. More domains would strengthen the claim.