npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@sdotwinter/openclaw-deterministic

v0.21.2

Published

Deterministic governance and memory compaction layer for OpenClaw

Readme

OpenClaw Deterministic (OCD)

Deterministic governance, memory discipline, and integrity enforcement framework for OpenClaw.

OpenClaw Deterministic transforms OpenClaw into a predictable, auditable execution system suitable for long-running agent deployments and CI environments.

This is not an assistant plugin.

It is a governance layer.


Installation

Install globally:

npm install -g @sdotwinter/openclaw-deterministic

Add to your PATH (optional but recommended):

export PATH="$PATH:$(npm root -g)/@sdotwinter/openclaw-deterministic/bin"

Or create a symlink:

sudo ln -s $(npm root -g)/@sdotwinter/openclaw-deterministic/bin/oc-deterministic /usr/local/bin/

Apply deterministic governance to an existing OpenClaw workspace:

oc-deterministic install

Verify installation:

oc-deterministic doctor

Concise health summary (CI-friendly):

oc-deterministic status

Safety Guarantees

OpenClaw Deterministic enforces execution discipline with explicit safety guarantees:

  • Does not overwrite an existing SOUL.md
  • Verifies canonical integrity before upgrade
  • Refuses to upgrade drifted files (unless --force)
  • Creates deterministic backup snapshots before mutation
  • Supports structured revert to previous snapshot
  • Exposes machine-readable health status
  • Blocks silent structural mutation

This system assumes drift is inevitable.

It makes drift visible.


What This Solves

AI systems drift over time:

  • Memory growth
  • File mutation
  • Execution misclassification
  • Configuration divergence
  • Contract ambiguity

OpenClaw Deterministic enforces:

  • Explicit execution tiers
  • Canonical template integrity verification
  • Semantic memory limits
  • Config-driven thresholds
  • Governance event logging
  • Structured health reporting

The objective:

Predictable execution under defined constraints.


Core Concepts

Deterministic Execution Tiers

Execution is classified into:

Tier A — Safe
Tier B — Governed Modification
Tier C — Destructive / Structural

Each tier defines:

  • Whether a diff preview is required
  • Whether confirmation is required
  • Whether auto-execution is allowed

This prevents silent behavioral drift.


Canonical Template Integrity

Deterministic templates embed canonical SHA256 hashes.

doctor verifies:

  • Template presence
  • Version alignment
  • Canonical integrity

If a file is manually edited outside deterministic flow, the system detects it.

Tamper visibility is enforced.


Upgrade Integrity Gate

oc-deterministic upgrade:

  • Verifies canonical integrity before applying changes
  • Refuses overwrite if drift is detected
  • Supports --force override
  • Supports --dry-run

Upgrade is governed mutation — not blind overwrite.


Deterministic Backup + Revert

Before template mutation:

Snapshots are stored at:

~/.openclaw/backups/deterministic//

Revert commands:

oc-deterministic revert --list
oc-deterministic revert --to

Revert restores deterministic files from snapshot.

This enables safe experimentation without state loss.


Semantic Memory Governance

Semantic memory is:

  • Token-estimated
  • Compared against configurable HARD_LIMIT
  • Evaluated against risk thresholds
  • Logged on violation

Configuration file:

~/.openclaw/.deterministic.json

Example:

{
  "semantic": {
    "HARD_LIMIT": 1200,
    "RISK_THRESHOLD_PERCENT": 85
  },
  "governance": {
    "violation_logging": true
  }
}

This prevents uncontrolled memory expansion.


Observability

Available commands:

init
install
upgrade
doctor
doctor --json
status
enable
revert
audit

Supports:

  • Machine-readable JSON output
  • Deterministic backup snapshots
  • Governance event logging
  • CI integration via exit codes

Architecture

Governance operates at three layers:

  1. Execution classification
  2. Memory pressure management
  3. Canonical integrity verification

OpenClaw Deterministic does not replace OpenClaw.

It constrains it.


Intended Use

Designed for:

  • Production OpenClaw deployments
  • Long-running agent systems
  • CI-integrated governance
  • Environments requiring auditability

If you want experimentation, use OpenClaw alone.

If you want discipline, use OpenClaw Deterministic.


Philosophy

Determinism over autonomy.

No silent behavior changes.

Explicit classification before execution.

Auditable state at all times.


License

MIT